Vulnerabilites related to intel - active_management_technology_firmware
cve-2020-0597
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:11
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) ISM Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:11:04.733Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-18T12:06:36",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0597",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT and Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                     refsource: "CONFIRM",
                     url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0597",
      datePublished: "2020-06-15T13:59:45",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:11:04.733Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-29893
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T06:33:43.116Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-29893",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-29T20:41:41.640882Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-287",
                        description: "CWE-287 Improper Authentication",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-05T20:54:17.483Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-14T17:45:58.507Z",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2022-29893",
      datePublished: "2022-11-11T15:48:36.224Z",
      dateReserved: "2022-05-11T04:14:45.489Z",
      dateUpdated: "2025-02-05T20:54:17.483Z",
      requesterUserId: "18e72eb2-8568-4e08-88e2-81b49c53dae3",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3616
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 16:53
Severity ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.382Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
               },
               {
                  name: "106996",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/106996",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before 12.0.5.",
                  },
               ],
            },
         ],
         datePublic: "2018-09-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-02-25T22:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
            },
            {
               name: "106996",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/106996",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2018-09-11T00:00:00",
               ID: "CVE-2018-3616",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before 12.0.5.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
                  },
                  {
                     name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
                     refsource: "MISC",
                     url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
                  },
                  {
                     name: "106996",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/106996",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20180924-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3616",
      datePublished: "2018-09-12T19:00:00Z",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-09-16T16:53:35.507Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12356
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 11:56
Severity ?
Summary
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:56:51.507Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:18",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-12356",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-12356",
      datePublished: "2020-11-12T18:09:24",
      dateReserved: "2020-04-28T00:00:00",
      dateUpdated: "2024-08-04T11:56:51.507Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-0097
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) Active Management Technology (AMT) Version: Versions before 12.0.35.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:37:07.277Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K84591451",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology (AMT)",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before 12.0.35.",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-20T15:06:05",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K84591451",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-0097",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology (AMT)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before 12.0.35.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K84591451",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K84591451",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-0097",
      datePublished: "2019-05-17T15:41:38",
      dateReserved: "2018-11-13T00:00:00",
      dateUpdated: "2024-08-04T17:37:07.277Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0540
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
Summary
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.186Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T13:47:40",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0540",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0540",
      datePublished: "2020-06-15T14:00:16",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.186Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0596
Vulnerability from cvelistv5
Published
2020-06-15 13:58
Modified
2024-08-04 06:11
Severity ?
Summary
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) ISM Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:11:04.620Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T14:06:47",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0596",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT and Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                     refsource: "CONFIRM",
                     url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0596",
      datePublished: "2020-06-15T13:58:14",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:11:04.620Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11086
Vulnerability from cvelistv5
Published
2019-12-18 21:10
Modified
2024-08-04 22:40
Severity ?
Summary
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:40:16.383Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:10:11",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11086",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11086",
      datePublished: "2019-12-18T21:10:11",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:40:16.383Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11088
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 22:40
Severity ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:40:16.383Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:08:03",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11088",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11088",
      datePublished: "2019-12-18T21:08:03",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:40:16.383Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-0166
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 17:44
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:44:14.624Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:08:50",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-0166",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-0166",
      datePublished: "2019-12-18T21:08:50",
      dateReserved: "2018-11-13T00:00:00",
      dateUpdated: "2024-08-04T17:44:14.624Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3658
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 22:35
Severity ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.323Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
               },
               {
                  name: "106996",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/106996",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before 12.0.5.",
                  },
               ],
            },
         ],
         datePublic: "2018-09-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-02-25T22:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
            },
            {
               name: "106996",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/106996",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2018-09-11T00:00:00",
               ID: "CVE-2018-3658",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before 12.0.5.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
                  },
                  {
                     name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
                     refsource: "MISC",
                     url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
                  },
                  {
                     name: "106996",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/106996",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20180924-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3658",
      datePublished: "2018-09-12T19:00:00Z",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-09-16T22:35:54.845Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11132
Vulnerability from cvelistv5
Published
2019-12-18 21:07
Modified
2024-08-04 22:48
Severity ?
Summary
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.502Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:07:47",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11132",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11132",
      datePublished: "2019-12-18T21:07:47",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.502Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11131
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 22:48
Severity ?
Summary
Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:09.044Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:08:08",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11131",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11131",
      datePublished: "2019-12-18T21:08:08",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:09.044Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-33068
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 23:42
Severity ?
Summary
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: before versions 15.0.35
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:42:19.482Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220210-0006/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "before versions 15.0.35",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: " denial of service ",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-10T09:06:16",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20220210-0006/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2021-33068",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "before versions 15.0.35",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: " denial of service ",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20220210-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20220210-0006/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2021-33068",
      datePublished: "2022-02-09T22:04:31",
      dateReserved: "2021-05-18T00:00:00",
      dateUpdated: "2024-08-03T23:42:19.482Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-30944
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 07:03
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) Standard Manageability Version: See references
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:03:39.824Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) Standard Manageability",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See references",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-14T00:00:00",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2022-30944",
      datePublished: "2022-08-18T00:00:00",
      dateReserved: "2022-06-09T00:00:00",
      dateUpdated: "2024-08-03T07:03:39.824Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8760
Vulnerability from cvelistv5
Published
2020-11-12 18:08
Modified
2024-08-04 10:12
Severity ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:10.229Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:16",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8760",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "escalation of privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8760",
      datePublished: "2020-11-12T18:08:03",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:10.229Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0595
Vulnerability from cvelistv5
Published
2020-06-15 13:56
Modified
2024-08-04 06:11
Severity ?
Summary
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) ISM Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:11:04.554Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-18T12:06:37",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0595",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT and Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                     refsource: "CONFIRM",
                     url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0595",
      datePublished: "2020-06-15T13:56:08",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:11:04.554Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-0092
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products
Vendor Product Version
n/a Intel(R) Active Management Technology (AMT) Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:37:07.199Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K84591451",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology (AMT)",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-20T15:06:05",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K84591451",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-0092",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology (AMT)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K84591451",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K84591451",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-0092",
      datePublished: "2019-05-17T15:41:38",
      dateReserved: "2018-11-13T00:00:00",
      dateUpdated: "2024-08-04T17:37:07.199Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-30601
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 06:56
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) Standard Manageability Version: See references
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T06:56:12.976Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) Standard Manageability",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See references",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure and escalation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-14T00:00:00",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2022-30601",
      datePublished: "2022-08-18T00:00:00",
      dateReserved: "2022-06-09T00:00:00",
      dateUpdated: "2024-08-03T06:56:12.976Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8746
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:09.493Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:17",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8746",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8746",
      datePublished: "2020-11-12T18:09:33",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:09.493Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8749
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:09.632Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:19",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8749",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "escalation of privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8749",
      datePublished: "2020-11-12T18:09:41",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:09.632Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-5711
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 19:20
Severity ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
Impacted products
Vendor Product Version
Intel Corporation Active Management Technology Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.562Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
               },
               {
                  name: "1039852",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1039852",
               },
               {
                  name: "101918",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/101918",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20",
                  },
               ],
            },
         ],
         datePublic: "2017-11-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-05-10T09:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
            },
            {
               name: "1039852",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1039852",
            },
            {
               name: "101918",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/101918",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2017-11-20T00:00:00",
               ID: "CVE-2017-5711",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://security.netapp.com/advisory/ntap-20171120-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
                  },
                  {
                     name: "1039852",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1039852",
                  },
                  {
                     name: "101918",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/101918",
                  },
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
                  },
                  {
                     name: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
                     refsource: "CONFIRM",
                     url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5711",
      datePublished: "2017-11-21T14:00:00Z",
      dateReserved: "2017-02-01T00:00:00",
      dateUpdated: "2024-09-16T19:20:12.640Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-27497
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Summary
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:32:57.943Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-27497",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-29T20:40:55.451083Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-476",
                        description: "CWE-476 NULL Pointer Dereference",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-05T20:54:25.497Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.6,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "denial of service",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-14T17:45:57.796Z",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2022-27497",
      datePublished: "2022-11-11T15:48:35.754Z",
      dateReserved: "2022-04-20T00:10:11.670Z",
      dateUpdated: "2025-02-05T20:54:25.497Z",
      requesterUserId: "e1538295-92a9-4bd5-bb63-88a76fc3a35c",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-0096
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
Summary
Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.
Impacted products
Vendor Product Version
n/a Intel(R) Active Management Technology (AMT) Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:37:07.542Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K84591451",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology (AMT)",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-20T15:06:05",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K84591451",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-0096",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology (AMT)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K84591451",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K84591451",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-0096",
      datePublished: "2019-05-17T15:41:38",
      dateReserved: "2018-11-13T00:00:00",
      dateUpdated: "2024-08-04T17:37:07.542Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8754
Vulnerability from cvelistv5
Published
2020-11-12 18:08
Modified
2024-08-04 10:12
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT, Intel(R) ISM Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:10.593Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT, Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:16",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8754",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT, Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8754",
      datePublished: "2020-11-12T18:08:35",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:10.593Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8747
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:09.650Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure and/or denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:20",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8747",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "information disclosure and/or denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8747",
      datePublished: "2020-11-12T18:09:04",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:09.650Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26845
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:11:44.541Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-26845",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-29T20:41:44.275582Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-287",
                        description: "CWE-287 Improper Authentication",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-05T20:54:33.714Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-14T17:45:57.128Z",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2022-26845",
      datePublished: "2022-11-11T15:48:35.294Z",
      dateReserved: "2022-04-05T15:12:32.582Z",
      dateUpdated: "2025-02-05T20:54:33.714Z",
      requesterUserId: "524a9a6b-3515-4b97-ab85-1a9a79493852",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0531
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:02
Severity ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.183Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T13:40:14",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0531",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0531",
      datePublished: "2020-06-15T13:59:53",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.183Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-5729
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-17 04:24
Severity ?
Summary
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.
Impacted products
Vendor Product Version
Intel Corporation Dual-Band Wireless-AC and Tri-Band Wireless-AC Version: 18.x.x.x/19.10.x/19.51.x.x/20.0.x.x
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.897Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Dual-Band Wireless-AC and Tri-Band Wireless-AC",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "18.x.x.x/19.10.x/19.51.x.x/20.0.x.x",
                  },
               ],
            },
         ],
         datePublic: "2017-11-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-21T13:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2017-11-20T00:00:00",
               ID: "CVE-2017-5729",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Dual-Band Wireless-AC and Tri-Band Wireless-AC",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "18.x.x.x/19.10.x/19.51.x.x/20.0.x.x",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5729",
      datePublished: "2017-11-21T14:00:00Z",
      dateReserved: "2017-02-01T00:00:00",
      dateUpdated: "2024-09-17T04:24:40.560Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-5689
Vulnerability from cvelistv5
Published
2017-05-02 14:00
Modified
2025-02-07 13:44
Severity ?
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
Impacted products
Vendor Product Version
Intel Corporation Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability Version: fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.401Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
               },
               {
                  name: "98269",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/98269",
               },
               {
                  name: "1038385",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1038385",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20170509-0001/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.embedi.com/news/mythbusters-cve-2017-5689",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2017-5689",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-07T13:43:44.728208Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2022-01-28",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-5689",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-269",
                        description: "CWE-269 Improper Privilege Management",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-07T13:44:05.635Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later",
                  },
               ],
            },
         ],
         datePublic: "2017-05-01T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-10T14:06:25.000Z",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
            },
            {
               name: "98269",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/98269",
            },
            {
               name: "1038385",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1038385",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20170509-0001/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.embedi.com/news/mythbusters-cve-2017-5689",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2017-5689",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
                     refsource: "MISC",
                     url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
                  },
                  {
                     name: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
                     refsource: "CONFIRM",
                     url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
                  },
                  {
                     name: "98269",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/98269",
                  },
                  {
                     name: "1038385",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1038385",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20170509-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20170509-0001/",
                  },
                  {
                     name: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
                     refsource: "MISC",
                     url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
                  },
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us",
                     refsource: "CONFIRM",
                     url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
                  },
                  {
                     name: "https://www.embedi.com/news/mythbusters-cve-2017-5689",
                     refsource: "MISC",
                     url: "https://www.embedi.com/news/mythbusters-cve-2017-5689",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5689",
      datePublished: "2017-05-02T14:00:00.000Z",
      dateReserved: "2017-02-01T00:00:00.000Z",
      dateUpdated: "2025-02-07T13:44:05.635Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-12187
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 02:26
Severity ?
Summary
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T08:30:59.347Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190318-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "Multiple versions.",
                  },
               ],
            },
         ],
         datePublic: "2019-03-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-18T06:06:06",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190318-0001/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2019-03-12T00:00:00",
               ID: "CVE-2018-12187",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Multiple versions.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190318-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190318-0001/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-12187",
      datePublished: "2019-03-14T20:00:00Z",
      dateReserved: "2018-06-11T00:00:00",
      dateUpdated: "2024-09-17T02:26:25.035Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8752
Vulnerability from cvelistv5
Published
2020-11-12 18:05
Modified
2024-08-04 10:12
Severity ?
Summary
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT, Intel(R) ISM versions Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:09.645Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT, Intel(R) ISM versions",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privileges",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:21",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8752",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT, Intel(R) ISM versions",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "escalation of privileges",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8752",
      datePublished: "2020-11-12T18:05:24",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:09.645Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3657
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 20:01
Severity ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
Impacted products
Vendor Product Version
Intel Corporation Intel(R) Active Management Technology Version: Versions before version 12.0.5.
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.304Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
               },
               {
                  name: "106996",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/106996",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before version 12.0.5.",
                  },
               ],
            },
         ],
         datePublic: "2018-09-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-02-25T22:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
            },
            {
               name: "106996",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/106996",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2018-09-11T00:00:00",
               ID: "CVE-2018-3657",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before version 12.0.5.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
                  },
                  {
                     name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
                     refsource: "MISC",
                     url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
                  },
                  {
                     name: "106996",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/106996",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20180924-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3657",
      datePublished: "2018-09-12T19:00:00Z",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-09-16T20:01:21.908Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0535
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.206Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T13:41:53",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0535",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0535",
      datePublished: "2020-06-15T14:00:01",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.206Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0538
Vulnerability from cvelistv5
Published
2020-06-15 13:58
Modified
2024-08-04 06:02
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.327Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T13:20:30",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0538",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0538",
      datePublished: "2020-06-15T13:58:27",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.327Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8753
Vulnerability from cvelistv5
Published
2020-11-12 18:05
Modified
2024-08-04 10:12
Severity ?
Summary
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT, Intel(R) ISM versions Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:09.616Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT, Intel(R) ISM versions",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:20",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8753",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT, Intel(R) ISM versions",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8753",
      datePublished: "2020-11-12T18:05:32",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:09.616Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-5698
Vulnerability from cvelistv5
Published
2017-09-05 19:00
Modified
2024-09-16 17:38
Severity ?
Summary
Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.556Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "version 11.0.25.3001 and 11.0.26.3000",
                  },
               ],
            },
         ],
         datePublic: "2017-09-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T19:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2017-09-28T00:00:00",
               ID: "CVE-2017-5698",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "version 11.0.25.3001 and 11.0.26.3000",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5698",
      datePublished: "2017-09-05T19:00:00Z",
      dateReserved: "2017-02-01T00:00:00",
      dateUpdated: "2024-09-16T17:38:42.112Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8757
Vulnerability from cvelistv5
Published
2020-11-12 18:07
Modified
2024-08-04 10:12
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:10.134Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T09:06:21",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8757",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "escalation of privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8757",
      datePublished: "2020-11-12T18:07:38",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:10.134Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11100
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:40
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:40:16.330Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:09:20",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11100",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11100",
      datePublished: "2019-12-18T21:09:20",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:40:16.330Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3628
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
Summary
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
Impacted products
Vendor Product Version
Intel Corporation Intel Active Management Technology Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.347Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1041362",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041362",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x",
                  },
               ],
            },
         ],
         datePublic: "2018-07-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-27T18:06:08",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "1041362",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041362",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2018-3628",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1041362",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041362",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190327-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3628",
      datePublished: "2018-07-10T21:00:00",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-08-05T04:50:30.347Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11107
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.655Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:09:47",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11107",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11107",
      datePublished: "2019-12-18T21:09:47",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.655Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3629
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
Summary
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
Impacted products
Vendor Product Version
Intel Corporation Intel Active Management Technology Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.326Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1041362",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041362",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x",
                  },
               ],
            },
         ],
         datePublic: "2018-07-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-27T18:06:09",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "1041362",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041362",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2018-3629",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1041362",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041362",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190327-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3629",
      datePublished: "2018-07-10T21:00:00",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-08-05T04:50:30.326Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3632
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
Summary
Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.
Impacted products
Vendor Product Version
Intel Corporation Intel Active Management Technology Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.208Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1041362",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041362",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x",
                  },
               ],
            },
         ],
         datePublic: "2018-07-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-27T18:06:09",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "1041362",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041362",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2018-3632",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1041362",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041362",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190327-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3632",
      datePublished: "2018-07-10T21:00:00",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-08-05T04:50:30.208Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8758
Vulnerability from cvelistv5
Published
2020-09-10 14:22
Modified
2024-08-04 10:12
Severity ?
Summary
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) ISM Version: Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:12:10.441Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200911-0005/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-09-11T12:06:34",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200911-0005/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8758",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT and Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200911-0005/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200911-0005/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8758",
      datePublished: "2020-09-10T14:22:14",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:12:10.441Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-0131
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 17:44
Severity ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:44:14.595Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-18T21:08:32",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-0131",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-0131",
      datePublished: "2019-12-18T21:08:32",
      dateReserved: "2018-11-13T00:00:00",
      dateUpdated: "2024-08-04T17:44:14.595Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0532
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:02
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.183Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T13:18:57",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0532",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0532",
      datePublished: "2020-06-15T13:59:22",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.183Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-33159
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2025-02-05 20:54
Summary
Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:42:20.015Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-33159",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-29T20:39:15.361042Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-287",
                        description: "CWE-287 Improper Authentication",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-05T20:54:08.124Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-14T17:45:59.209Z",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2021-33159",
      datePublished: "2022-11-11T15:48:36.704Z",
      dateReserved: "2021-05-18T00:31:17.246Z",
      dateUpdated: "2025-02-05T20:54:08.124Z",
      requesterUserId: "520cc88b-a1c8-44f6-9154-21a4d74c769f",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-8674
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 10:03
Severity ?
Summary
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) ISM Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:03:46.339Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-18T12:06:38",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-8674",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT and Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                     refsource: "CONFIRM",
                     url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-8674",
      datePublished: "2020-06-15T14:00:54",
      dateReserved: "2020-02-06T00:00:00",
      dateUpdated: "2024-08-04T10:03:46.339Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-5712
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 23:21
Severity ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
Impacted products
Vendor Product Version
Intel Corporation Active Management Technology Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.603Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
               },
               {
                  name: "1039852",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1039852",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
               },
               {
                  name: "101920",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/101920",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Active Management Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20",
                  },
               ],
            },
         ],
         datePublic: "2017-11-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-05-10T09:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
            },
            {
               name: "1039852",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1039852",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
            },
            {
               name: "101920",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/101920",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2017-11-20T00:00:00",
               ID: "CVE-2017-5712",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Active Management Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://security.netapp.com/advisory/ntap-20171120-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
                  },
                  {
                     name: "1039852",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1039852",
                  },
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
                  },
                  {
                     name: "101920",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/101920",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
                  },
                  {
                     name: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
                     refsource: "CONFIRM",
                     url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5712",
      datePublished: "2017-11-21T14:00:00Z",
      dateReserved: "2017-02-01T00:00:00",
      dateUpdated: "2024-09-16T23:21:05.833Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-0094
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.
Impacted products
Vendor Product Version
n/a Intel(R) Active Management Technology (AMT) Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:37:07.287Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K84591451",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Active Management Technology (AMT)",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-20T15:06:05",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K84591451",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-0094",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Active Management Technology (AMT)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K84591451",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K84591451",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-0094",
      datePublished: "2019-05-17T15:41:38",
      dateReserved: "2018-11-13T00:00:00",
      dateUpdated: "2024-08-04T17:37:07.287Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0594
Vulnerability from cvelistv5
Published
2020-06-15 13:55
Modified
2024-08-04 06:11
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) ISM Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:11:04.539Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) ISM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-18T12:06:37",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0594",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT and Intel(R) ISM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                     refsource: "CONFIRM",
                     url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0594",
      datePublished: "2020-06-15T13:55:42",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:11:04.539Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-5697
Vulnerability from cvelistv5
Published
2017-06-14 12:00
Modified
2024-08-05 15:11
Severity ?
Summary
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.
Impacted products
Vendor Product Version
Intel Corporation Active Mangement Technology Version: before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.546Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Active Mangement Technology",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129",
                  },
               ],
            },
         ],
         datePublic: "2017-06-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-14T12:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2017-5697",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Active Mangement Technology",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5697",
      datePublished: "2017-06-14T12:00:00",
      dateReserved: "2017-02-01T00:00:00",
      dateUpdated: "2024-08-05T15:11:48.546Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-28697
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 06:03
Severity ?
Summary
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) Standard Manageability Version: See references
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T06:03:52.067Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT and Intel(R) Standard Manageability",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See references",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "escalation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-14T00:00:00",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2022-28697",
      datePublished: "2022-08-18T00:00:00",
      dateReserved: "2022-06-09T00:00:00",
      dateUpdated: "2024-08-03T06:03:52.067Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0537
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) AMT Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.189Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/de/en/product_security/len-30041",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) AMT",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T13:38:40",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.lenovo.com/de/en/product_security/len-30041",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0537",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) AMT",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "https://support.lenovo.com/de/en/product_security/len-30041",
                     refsource: "MISC",
                     url: "https://support.lenovo.com/de/en/product_security/len-30041",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0537",
      datePublished: "2020-06-15T14:00:32",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.189Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15",
                     versionEndExcluding: "11.8.70",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B",
                     versionEndExcluding: "11.11.70",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43",
                     versionEndExcluding: "11.22.70",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "Un problema lógico en el subsistema para Intel(R)  AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red.",
      },
   ],
   id: "CVE-2019-11131",
   lastModified: "2024-11-21T04:20:35.260",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:13.283",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
      },
      {
         lang: "es",
         value: "Un desbordamiento de enteros en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una denegación de servicio por medio de un acceso adyacente",
      },
   ],
   id: "CVE-2020-8746",
   lastModified: "2024-11-21T05:39:22.340",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:17.377",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 07:03
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F802F5D5-BAF0-4246-BEAD-9227BF50EE88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "Unas credenciales insuficientemente protegidas para Intel(R) AMT e Intel(R) Standard Manageability pueden permitir que un usuario no autenticado permita potencialmente la divulgación de información y la escalada de privilegios por medio del acceso a la red.",
      },
   ],
   id: "CVE-2022-30601",
   lastModified: "2024-11-21T07:03:00.420",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-18T21:15:08.557",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-06-14 12:29
Modified
2024-11-21 03:28
Summary
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "128CB305-59C6-40A9-9E0E-815BC1F1FFE3",
                     versionEndExcluding: "9.1.40.1000",
                     versionStartIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9784196C-F8D7-4F68-BC88-12C34F0F748C",
                     versionEndExcluding: "9.5.60.1952",
                     versionStartIncluding: "9.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E75ED508-CF5D-4FEF-8DDC-791691BA9E17",
                     versionEndExcluding: "10.0.50.1004",
                     versionStartIncluding: "10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C02C097C-9B6F-4420-A89E-BA2E0BC94074",
                     versionEndExcluding: "11.0.0.1205",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C69D06FF-7A9E-4ADD-BF92-597053ADBD9D",
                     versionEndExcluding: "11.6.25.1129",
                     versionStartIncluding: "11.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.",
      },
      {
         lang: "es",
         value: "Protección insuficiente contra el secuestro de la acción click en la Interfaz de usuario web de Intel AMT versiones de firmware anteriores a 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205 y 11.6.25.1129, que potencialmente permiten a un atacante remoto secuestrar los cliqueos web de los usuarios por medio de la página web especialmente diseñada.",
      },
   ],
   id: "CVE-2017-5697",
   lastModified: "2024-11-21T03:28:14.573",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-06-14T12:29:00.177",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1021",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "503E551C-FC5F-4ABC-8DEA-E360701F0B33",
                     versionEndExcluding: "22.01.06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F546AF-8F80-4E0A-9B92-86E3A1F931C0",
                     versionEndExcluding: "21.01.09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5B6E6B-16A0-4236-AABE-82385B53EC78",
                     versionEndExcluding: "21.01.09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D476D093-4A97-499C-B40D-7A301BC9AA2E",
                     versionEndExcluding: "r1.30.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6A757F1-E478-4A3D-8D5F-C996E176A11A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D",
                     versionEndExcluding: "r1.23.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EB339B5-602F-4AB5-9998-465FDC6ABD6C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "790D244A-AC3D-4BBC-9139-A90048FD375A",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C046182-BB33-41D0-B041-1566B8041917",
                     versionEndExcluding: "19.01.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DE74300-E061-452E-AD1D-6DD7C2C62729",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4A7C13-6F81-4629-9C28-9202028634AE",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93485235-481B-4BAF-BB7A-81BB5AA1BC53",
                     versionEndExcluding: "19.01.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD949046-46E5-48C9-883B-92F04926E8BC",
                     versionEndExcluding: "23.01.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23AFAB4-B286-4FD6-ABC3-86B2881E271C",
                     versionEndExcluding: "12.0.5",
                     versionStartIncluding: "11.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5FAD938-027A-406F-9E7C-1BFD992839F4",
                     versionEndExcluding: "12.0.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63591E72-6038-4417-BA10-54180507AF0F",
                     versionEndExcluding: "11.0",
                     versionStartIncluding: "9.0.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.",
      },
      {
         lang: "es",
         value: "Múltiples desbordamientos de búfer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podrían permitir que un usuario privilegiado ejecute código arbitrario con privilegios de ejecución AMT mediante acceso local.",
      },
   ],
   id: "CVE-2018-3657",
   lastModified: "2024-11-21T04:05:50.857",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-09-12T19:29:02.840",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106996",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0FD2059-FA89-4010-89C3-1B5BD11E882B",
                     versionEndExcluding: "11.8.65",
                     versionStartIncluding: "11.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A856CF2-8F1D-47C1-939A-F86919F3C2D0",
                     versionEndExcluding: "11.11.65",
                     versionStartIncluding: "11.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5",
                     versionEndExcluding: "11.22.65",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FED09AD-4EEE-4D93-A7EA-DC96F706814F",
                     versionEndExcluding: "12.0.35",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad por  insuficiente validación de entrada en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir a un usuario no autenticado habilitar potencialmente la denegación de servicio a través del acceso a la red adyacente.",
      },
   ],
   id: "CVE-2019-0094",
   lastModified: "2024-11-21T04:16:13.243",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-17T16:29:01.203",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 05:39
Summary
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A288FA3-B8DE-48C0-ACB3-2CB0C2F212AF",
                     versionEndExcluding: "14.0.33",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAEB6ABB-9539-44C2-9177-DFB20AAA4274",
                     versionEndExcluding: "14.0.33",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límite en el subsistema DHCPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77, 12.0.64 y 14.0.33, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-8674",
   lastModified: "2024-11-21T05:39:14.073",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:12.440",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:16
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15",
                     versionEndExcluding: "11.8.70",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B",
                     versionEndExcluding: "11.11.70",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43",
                     versionEndExcluding: "11.22.70",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red.",
      },
   ],
   id: "CVE-2019-0166",
   lastModified: "2024-11-21T04:16:23.620",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:11.770",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información y/o la negación de servicio por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-8747",
   lastModified: "2024-11-21T05:39:22.437",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:17.457",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Summary
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15",
                     versionEndExcluding: "11.8.70",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B",
                     versionEndExcluding: "11.11.70",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43",
                     versionEndExcluding: "11.22.70",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de tipo cross site scripting en el subsistema para Intel(R) AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario privilegiado habilitar una escalada de privilegios por medio de un acceso de red.",
      },
   ],
   id: "CVE-2019-11132",
   lastModified: "2024-11-21T04:20:35.367",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.7,
            impactScore: 6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:13.377",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Summary
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
Impacted products
Vendor Product Version
intel active_management_technology_firmware *
intel core_2_duo e4300
intel core_2_duo e4400
intel core_2_duo e4500
intel core_2_duo e4600
intel core_2_duo e4700
intel core_2_duo e6300
intel core_2_duo e6320
intel core_2_duo e6400
intel core_2_duo e6420
intel core_2_duo e6540
intel core_2_duo e6550
intel core_2_duo e6600
intel core_2_duo e6700
intel core_2_duo e6750
intel core_2_duo e6850
intel core_2_duo e7200
intel core_2_duo e7300
intel core_2_duo e7400
intel core_2_duo e7500
intel core_2_duo e7600
intel core_2_duo e8190
intel core_2_duo e8200
intel core_2_duo e8300
intel core_2_duo e8400
intel core_2_duo e8500
intel core_2_duo e8600
intel core_2_duo l7200
intel core_2_duo l7300
intel core_2_duo l7400
intel core_2_duo l7500
intel core_2_duo l7700
intel core_2_duo p7350
intel core_2_duo p7370
intel core_2_duo p7450
intel core_2_duo p7550
intel core_2_duo p7570
intel core_2_duo p8400
intel core_2_duo p8600
intel core_2_duo p8700
intel core_2_duo p8800
intel core_2_duo p9500
intel core_2_duo p9600
intel core_2_duo p9700
intel core_2_duo sl9300
intel core_2_duo sl9380
intel core_2_duo sl9400
intel core_2_duo sl9600
intel core_2_duo sp9300
intel core_2_duo sp9400
intel core_2_duo sp9600
intel core_2_duo su9300
intel core_2_duo su9400
intel core_2_duo su9600
intel core_2_duo t5200
intel core_2_duo t5250
intel core_2_duo t5270
intel core_2_duo t5300
intel core_2_duo t5450
intel core_2_duo t5470
intel core_2_duo t5500
intel core_2_duo t5550
intel core_2_duo t5600
intel core_2_duo t5670
intel core_2_duo t5750
intel core_2_duo t5800
intel core_2_duo t5870
intel core_2_duo t6400
intel core_2_duo t6500
intel core_2_duo t6600
intel core_2_duo t6670
intel core_2_duo t7100
intel core_2_duo t7200
intel core_2_duo t7250
intel core_2_duo t7300
intel core_2_duo t7400
intel core_2_duo t7500
intel core_2_duo t7600
intel core_2_duo t7700
intel core_2_duo t7800
intel core_2_duo t8100
intel core_2_duo t8300
intel core_2_duo t9300
intel core_2_duo t9400
intel core_2_duo t9500
intel core_2_duo t9550
intel core_2_duo t9600
intel core_2_duo t9800
intel core_2_duo t9900
intel core_2_duo u7500
intel core_2_duo u7600
intel core_2_duo u7700
intel active_management_technology_firmware *
intel core_i3 4000m
intel core_i3 4005u
intel core_i3 4010u
intel core_i3 4010y
intel core_i3 4012y
intel core_i3 4020y
intel core_i3 4025u
intel core_i3 4030u
intel core_i3 4030y
intel core_i3 4100e
intel core_i3 4100m
intel core_i3 4100u
intel core_i3 4102e
intel core_i3 4110e
intel core_i3 4110m
intel core_i3 4112e
intel core_i3 4120u
intel core_i3 4130
intel core_i3 4130t
intel core_i3 4150
intel core_i3 4150t
intel core_i3 4158u
intel core_i3 4160
intel core_i3 4160t
intel core_i3 4170
intel core_i3 4170t
intel core_i3 4330
intel core_i3 4330t
intel core_i3 4330te
intel core_i3 4340
intel core_i3 4340te
intel core_i3 4350
intel core_i3 4350t
intel core_i3 4360
intel core_i3 4360t
intel core_i3 4370
intel core_i3 4370t
intel core_i5 4200h
intel core_i5 4200m
intel core_i5 4200u
intel core_i5 4200y
intel core_i5 4202y
intel core_i5 4210h
intel core_i5 4210m
intel core_i5 4210u
intel core_i5 4210y
intel core_i5 4220y
intel core_i5 4250u
intel core_i5 4258u
intel core_i5 4260u
intel core_i5 4278u
intel core_i5 4288u
intel core_i5 4300m
intel core_i5 4300u
intel core_i5 4300y
intel core_i5 4302y
intel core_i5 4308u
intel core_i5 4310m
intel core_i5 4310u
intel core_i5 4330m
intel core_i5 4340m
intel core_i5 4350u
intel core_i5 4360u
intel core_i5 4400e
intel core_i5 4402e
intel core_i5 4402ec
intel core_i5 4410e
intel core_i5 4422e
intel core_i5 4430
intel core_i5 4430s
intel core_i5 4440
intel core_i5 4440s
intel core_i5 4460
intel core_i5 4460s
intel core_i5 4460t
intel core_i5 4570
intel core_i5 4570r
intel core_i5 4570s
intel core_i5 4570t
intel core_i5 4570te
intel core_i5 4590
intel core_i5 4590s
intel core_i5 4590t
intel core_i5 4670
intel core_i5 4670k
intel core_i5 4670r
intel core_i5 4670s
intel core_i5 4670t
intel core_i5 4690
intel core_i5 4690k
intel core_i5 4690s
intel core_i5 4690t
intel core_i7 4500u
intel core_i7 4510u
intel core_i7 4550u
intel core_i7 4558u
intel core_i7 4578u
intel core_i7 4600m
intel core_i7 4600u
intel core_i7 4610m
intel core_i7 4610y
intel core_i7 4650u
intel core_i7 4700ec
intel core_i7 4700eq
intel core_i7 4700hq
intel core_i7 4700mq
intel core_i7 4702ec
intel core_i7 4702hq
intel core_i7 4702mq
intel core_i7 4710hq
intel core_i7 4710mq
intel core_i7 4712hq
intel core_i7 4712mq
intel core_i7 4720hq
intel core_i7 4722hq
intel core_i7 4750hq
intel core_i7 4760hq
intel core_i7 4765t
intel core_i7 4770
intel core_i7 4770hq
intel core_i7 4770k
intel core_i7 4770r
intel core_i7 4770s
intel core_i7 4770t
intel core_i7 4770te
intel core_i7 4771
intel core_i7 4785t
intel core_i7 4790
intel core_i7 4790k
intel core_i7 4790s
intel core_i7 4790t
intel core_i7 4800mq
intel core_i7 4810mq
intel core_i7 4850hq
intel core_i7 4860hq
intel core_i7 4870hq
intel core_i7 4900mq
intel core_i7 4910mq
intel core_i7 4950hq
intel core_i7 4960hq
intel core_i7 4980hq
intel active_management_technology_firmware *
intel core_i3 6006u
intel core_i3 6098p
intel core_i3 6100
intel core_i3 6100e
intel core_i3 6100h
intel core_i3 6100t
intel core_i3 6100te
intel core_i3 6100u
intel core_i3 6102e
intel core_i3 6157u
intel core_i3 6167u
intel core_i3 6300
intel core_i3 6300t
intel core_i3 6320
intel core_i5 6200u
intel core_i5 6260u
intel core_i5 6267u
intel core_i5 6287u
intel core_i5 6300hq
intel core_i5 6300u
intel core_i5 6350hq
intel core_i5 6360u
intel core_i5 6400
intel core_i5 6400t
intel core_i5 6402p
intel core_i5 6440eq
intel core_i5 6440hq
intel core_i5 6442eq
intel core_i5 6500
intel core_i5 6500t
intel core_i5 6500te
intel core_i5 6585r
intel core_i5 6600
intel core_i5 6600k
intel core_i5 6600t
intel core_i5 6685r
intel core_i7 6500u
intel core_i7 6560u
intel core_i7 6567u
intel core_i7 6600u
intel core_i7 6650u
intel core_i7 6660u
intel core_i7 6700
intel core_i7 6700hq
intel core_i7 6700k
intel core_i7 6700t
intel core_i7 6700te
intel core_i7 6770hq
intel core_i7 6785r
intel core_i7 6820eq
intel core_i7 6820hk
intel core_i7 6820hq
intel core_i7 6822eq
intel core_i7 6870hq
intel core_i7 6920hq
intel core_i7 6970hq
intel active_management_technology_firmware *
intel core_i3 5005u
intel core_i3 5010u
intel core_i3 5015u
intel core_i3 5020u
intel core_i3 5157u
intel core_i5 5200u
intel core_i5 5250u
intel core_i5 5257u
intel core_i5 5287u
intel core_i5 5300u
intel core_i5 5350h
intel core_i5 5350u
intel core_i5 5575r
intel core_i5 5675c
intel core_i5 5675r
intel core_i7 5500u
intel core_i7 5550u
intel core_i7 5557u
intel core_i7 5600u
intel core_i7 5650u
intel core_i7 5700eq
intel core_i7 5700hq
intel core_i7 5750hq
intel core_i7 5775c
intel core_i7 5775r
intel core_i7 5850eq
intel core_i7 5850hq
intel core_i7 5950hq
intel active_management_technology_firmware *
intel core_i3 7020u
intel core_i3 7100
intel core_i3 7100e
intel core_i3 7100h
intel core_i3 7100t
intel core_i3 7100u
intel core_i3 7101e
intel core_i3 7101te
intel core_i3 7102e
intel core_i3 7130u
intel core_i3 7167u
intel core_i3 7300
intel core_i3 7300t
intel core_i3 7320
intel core_i3 7350k
intel core_i5 7y54
intel core_i5 7y57
intel core_i5 7200u
intel core_i5 7260u
intel core_i5 7267u
intel core_i5 7287u
intel core_i5 7300hq
intel core_i5 7300u
intel core_i5 7360u
intel core_i5 7400
intel core_i5 7400t
intel core_i5 7440eq
intel core_i5 7440hq
intel core_i5 7442eq
intel core_i5 7500
intel core_i5 7500t
intel core_i5 7600
intel core_i5 7600k
intel core_i5 7600t
intel core_i7 7y75
intel core_i7 700t
intel core_i7 7500u
intel core_i7 7560u
intel core_i7 7567u
intel core_i7 7600u
intel core_i7 7660u
intel core_i7 7700
intel core_i7 7700hq
intel core_i7 7700k
intel core_i7 7820eq
intel core_i7 7820hk
intel core_i7 7820hq
intel core_i7 7920hq
intel active_management_technology_firmware *
intel core_i3 8100
intel core_i3 8100h
intel core_i3 8100t
intel core_i3 8109u
intel core_i3 8130u
intel core_i3 8145u
intel core_i3 8300
intel core_i3 8300t
intel core_i3 8350k
intel core_i5 8200y
intel core_i5 8250u
intel core_i5 8259u
intel core_i5 8265u
intel core_i5 8269u
intel core_i5 8300h
intel core_i5 8305g
intel core_i5 8350u
intel core_i5 8400
intel core_i5 8400b
intel core_i5 8400h
intel core_i5 8400t
intel core_i5 8500
intel core_i5 8500b
intel core_i5 8500t
intel core_i5 8600
intel core_i5 8600k
intel core_i5 8600t
intel core_i7 8086k
intel core_i7 8500y
intel core_i7 8550u
intel core_i7 8559u
intel core_i7 8565u
intel core_i7 8650u
intel core_i7 8700
intel core_i7 8700b
intel core_i7 8700k
intel core_i7 8700t
intel core_i7 8705g
intel core_i7 8706g
intel core_i7 8709g
intel core_i7 8750h
intel core_i7 8809g
intel core_i7 8850h
intel core_i9 8950hk
intel active_management_technology_firmware *
intel core_2_extreme qx6700
intel core_2_extreme qx6800
intel core_2_extreme qx6850
intel core_2_extreme qx9300
intel core_2_extreme qx9650
intel core_2_extreme qx9770
intel core_2_extreme qx9775
intel core_2_extreme x6800
intel core_2_extreme x7800
intel core_2_extreme x7900
intel core_2_extreme x9000
intel core_2_extreme x9100
intel core_2_quad q6600
intel core_2_quad q6700
intel core_2_quad q8200
intel core_2_quad q8200s
intel core_2_quad q8300
intel core_2_quad q8400
intel core_2_quad q8400s
intel core_2_quad q9000
intel core_2_quad q9100
intel core_2_quad q9300
intel core_2_quad q9400
intel core_2_quad q9400s
intel core_2_quad q9450
intel core_2_quad q9500
intel core_2_quad q9505
intel core_2_quad q9505s
intel core_2_quad q9550
intel core_2_quad q9550s
intel core_2_quad q9650
intel core_2_solo su3500
intel core_2_solo u2100
intel core_2_solo u2200
intel core_2_solo ulv_su3300
intel core_2_solo ulv_su3500
intel core_duo l2300
intel core_duo l2400
intel core_duo l2500
intel core_duo t2050
intel core_duo t2250
intel core_duo t2300
intel core_duo t2300e
intel core_duo t2350
intel core_duo t2400
intel core_duo t2450
intel core_duo t2500
intel core_duo t2600
intel core_duo t2700
intel core_duo u2400
intel core_duo u2500
intel core_i3 330e
intel core_i3 330m
intel core_i3 330um
intel core_i3 350m
intel core_i3 370m
intel core_i3 380m
intel core_i3 380um
intel core_i3 390m
intel core_i3 530
intel core_i3 540
intel core_i3 550
intel core_i3 560
intel core_i3 2100
intel core_i3 2100t
intel core_i3 2102
intel core_i3 2105
intel core_i3 2115c
intel core_i3 2120
intel core_i3 2120t
intel core_i3 2125
intel core_i3 2130
intel core_i3 2310e
intel core_i3 2310m
intel core_i3 2312m
intel core_i3 2328m
intel core_i3 2330e
intel core_i3 2330m
intel core_i3 2340ue
intel core_i3 2348m
intel core_i3 2350m
intel core_i3 2357m
intel core_i3 2365m
intel core_i3 2367m
intel core_i3 2370m
intel core_i3 2375m
intel core_i3 2377m
intel core_i3 3110m
intel core_i3 3115c
intel core_i3 3120m
intel core_i3 3120me
intel core_i3 3130m
intel core_i3 3210
intel core_i3 3217u
intel core_i3 3217ue
intel core_i3 3220
intel core_i3 3220t
intel core_i3 3225
intel core_i3 3227u
intel core_i3 3229y
intel core_i3 3240
intel core_i3 3240t
intel core_i3 3245
intel core_i3 3250
intel core_i3 3250t
intel core_i5 430m
intel core_i5 430um
intel core_i5 450m
intel core_i5 460m
intel core_i5 470um
intel core_i5 480m
intel core_i5 520e
intel core_i5 520m
intel core_i5 520um
intel core_i5 540m
intel core_i5 540um
intel core_i5 560m
intel core_i5 560um
intel core_i5 580m
intel core_i5 650
intel core_i5 655k
intel core_i5 660
intel core_i5 661
intel core_i5 670
intel core_i5 680
intel core_i5 750
intel core_i5 750s
intel core_i5 760
intel core_i5 2300
intel core_i5 2310
intel core_i5 2320
intel core_i5 2380p
intel core_i5 2390t
intel core_i5 2400
intel core_i5 2400s
intel core_i5 2405s
intel core_i5 2410m
intel core_i5 2430m
intel core_i5 2435m
intel core_i5 2450m
intel core_i5 2450p
intel core_i5 2467m
intel core_i5 2500
intel core_i5 2500k
intel core_i5 2500s
intel core_i5 2500t
intel core_i5 2510e
intel core_i5 2515e
intel core_i5 2520m
intel core_i5 2537m
intel core_i5 2540m
intel core_i5 2550k
intel core_i5 2557m
intel core_i5 3210m
intel core_i5 3230m
intel core_i5 3317u
intel core_i5 3320m
intel core_i5 3330
intel core_i5 3330s
intel core_i5 3337u
intel core_i5 3339y
intel core_i5 3340
intel core_i5 3340m
intel core_i5 3340s
intel core_i5 3350p
intel core_i5 3360m
intel core_i5 3380m
intel core_i5 3427u
intel core_i5 3437u
intel core_i5 3439y
intel core_i5 3450_
intel core_i5 3450s
intel core_i5 3470
intel core_i5 3470s
intel core_i5 3470t
intel core_i5 3475s
intel core_i5 3550
intel core_i5 3550s
intel core_i5 3570
intel core_i5 3570k
intel core_i5 3570s
intel core_i5 3570t
intel core_i5 3610me
intel core_i7 610e
intel core_i7 620le
intel core_i7 620lm
intel core_i7 620m
intel core_i7 620ue
intel core_i7 620um
intel core_i7 640lm
intel core_i7 640m
intel core_i7 640um
intel core_i7 660lm
intel core_i7 660ue
intel core_i7 660um
intel core_i7 680um
intel core_i7 720qm
intel core_i7 740qm
intel core_i7 820qm
intel core_i7 840qm
intel core_i7 860
intel core_i7 860s
intel core_i7 870
intel core_i7 870s
intel core_i7 875k
intel core_i7 880
intel core_i7 920
intel core_i7 920xm
intel core_i7 930
intel core_i7 940
intel core_i7 940xm
intel core_i7 950
intel core_i7 960
intel core_i7 965
intel core_i7 970
intel core_i7 975
intel core_i7 980
intel core_i7 980x
intel core_i7 990x
intel core_i7 2600
intel core_i7 2600k
intel core_i7 2600s
intel core_i7 2610ue
intel core_i7 2617m
intel core_i7 2620m
intel core_i7 2629m
intel core_i7 2630qm
intel core_i7 2635qm
intel core_i7 2637m
intel core_i7 2640m
intel core_i7 2649m
intel core_i7 2655le
intel core_i7 2657m
intel core_i7 2670qm
intel core_i7 2675qm
intel core_i7 2677m
intel core_i7 2700k
intel core_i7 2710qe
intel core_i7 2715qe
intel core_i7 2720qm
intel core_i7 2760qm
intel core_i7 2820qm
intel core_i7 2860qm
intel core_i7 2920xm
intel core_i7 2960xm
intel core_i7 3517u
intel core_i7 3517ue
intel core_i7 3520m
intel core_i7 3537u
intel core_i7 3540m
intel core_i7 3555le
intel core_i7 3610qe
intel core_i7 3610qm
intel core_i7 3612qe
intel core_i7 3612qm
intel core_i7 3615qe
intel core_i7 3615qm
intel core_i7 3630qm
intel core_i7 3632qm
intel core_i7 3635qm
intel core_i7 3667u
intel core_i7 3687u
intel core_i7 3689y
intel core_i7 3720qm
intel core_i7 3740qm
intel core_i7 3770
intel core_i7 3770k
intel core_i7 3770s
intel core_i7 3770t
intel core_i7 3820qm
intel core_i7 3840qm
intel core_solo t1250
intel core_solo t1300
intel core_solo t1350
intel core_solo t1400
intel core_solo u1300
intel core_solo u1400
intel core_solo u1500
intel active_management_technology_firmware *
intel xeon_gold 5115
intel xeon_gold 5118
intel xeon_gold 5119t
intel xeon_gold 5120
intel xeon_gold 5120t
intel xeon_gold 5122
intel xeon_gold 6126
intel xeon_gold 6126f
intel xeon_gold 6126t
intel xeon_gold 6128
intel xeon_gold 6130
intel xeon_gold 6130f
intel xeon_gold 6130t
intel xeon_gold 6132
intel xeon_gold 6134
intel xeon_gold 6134m
intel xeon_gold 6136
intel xeon_gold 6138
intel xeon_gold 6138f
intel xeon_gold 6138t
intel xeon_gold 6140
intel xeon_gold 6140m
intel xeon_gold 6142
intel xeon_gold 6142f
intel xeon_gold 6142m
intel xeon_gold 6144
intel xeon_gold 6146
intel xeon_gold 6148
intel xeon_gold 6148f
intel xeon_gold 6150
intel xeon_gold 6152
intel xeon_gold 6154
intel xeon_platinum 8153
intel xeon_platinum 8156
intel xeon_platinum 8158
intel xeon_platinum 8160
intel xeon_platinum 8160f
intel xeon_platinum 8160m
intel xeon_platinum 8160t
intel xeon_platinum 8164
intel xeon_platinum 8168
intel xeon_platinum 8170
intel xeon_platinum 8170m
intel xeon_platinum 8176
intel xeon_platinum 8176f
intel xeon_platinum 8176m
intel xeon_platinum 8180
intel xeon_silver 4108
intel xeon_silver 4109t
intel xeon_silver 4110
intel xeon_silver 4112
intel xeon_silver 4114
intel xeon_silver 4114t
intel xeon_silver 4116
intel xeon_silver 4116t
intel active_management_technology_firmware *
intel xeon w2123
intel xeon w2125
intel xeon w2133
intel xeon w2135
intel xeon w2145
intel xeon w2155
intel xeon w2175
intel xeon w2195



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F249992-79C7-4005-9804-97FFFAC658E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*",
                     matchCriteriaId: "81C6DAFF-FD39-434C-8426-4BE5F39355EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE259EF-22F6-4AA1-BDF6-448E15B96F14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFED12C9-2563-4036-BEBC-DD9D67095917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*",
                     matchCriteriaId: "18155178-43F1-48A6-AC0E-9578031F7F04",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C47688B-1D40-4D73-B363-E2E8230588FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BF929E-1288-448A-83A4-D26D86D26EF9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8E4CB07-1768-4C18-ACAD-73773042C752",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*",
                     matchCriteriaId: "31465D8E-A705-4AE3-AB2A-C296554E514C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8B2D356-DD32-46E0-9459-67E10AE44104",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDF6AC-7356-417F-84F6-33E9E3AA2082",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8E6F0AF-78AC-4257-9164-A9A4CCA05968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA61740-3E29-4820-9897-9BCB90490D49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "633350BA-34B4-4927-82B9-B44D1286D8FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2E687A6-87AA-4F3A-98AB-A164EC0EE051",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A8F993-32F4-487A-A33D-814BCDF1FAB7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "09EC7A10-C2AB-4DD4-9C75-073344F635E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C83B3D2-E293-4D33-AE5B-1789466696DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB399F3F-7C6E-463E-B822-A4365A4C290A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5175C41-110B-4C26-80CB-C25DA11F639B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63DAF721-A7E8-4263-869D-D9E100D7C598",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79057F7-72D3-4176-BBDD-E9A362153E66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD65648B-B7DB-432F-8F88-6C624F94F809",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A949D34-E086-4821-B73A-DCCFDD6C5616",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "93055544-064D-46FE-92E4-48F69DDD29B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A98184C-18F5-424C-BB74-9A8094B5992C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*",
                     matchCriteriaId: "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EB52214-6E22-49BF-B2F6-0AA282108E0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E0DA72-76B5-4022-BBFA-B886F0F662CE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F67F016-A068-4079-AAE5-B247BBAE1B2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD57E072-FF46-4637-B7CF-D6C2F3BA8782",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B18E14C-4DC4-4AEB-8792-968D893BA402",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*",
                     matchCriteriaId: "B706F7E4-8169-48A5-86D1-3592D3D9B845",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "808DAAA6-9047-49A1-BC0B-9D4725299CA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "57EFA3F2-5C76-48AF-931F-7463633370A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6FF59F0-9F30-448F-A109-B90FCC513CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "07EFB7B3-772A-476D-B30F-2A442F64928F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A69B9F-EF79-4642-A2A8-75395AD7506E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C6D7877-1990-481F-9CFF-81A2BD39DA6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A17D56F-D53C-4198-B7EF-95BAA4711B3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*",
                     matchCriteriaId: "E13892FB-C1D0-4C46-A171-9D055E58DE0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB830245-29AF-4F0E-9C12-6BED7E76609D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*",
                     matchCriteriaId: "17ACD170-347E-4DF5-AE0D-DF00854480A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B8BCF08-D863-435F-9E70-78C7542A3C0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E57F037-EE11-4148-A214-0650A98A07F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F641F2A7-64C7-43DB-862B-B7117E1B9CBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*",
                     matchCriteriaId: "51086E20-8A3D-4A68-8048-D385865D50FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*",
                     matchCriteriaId: "2621BF41-EFD1-4C8A-9426-A937B68DC71E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*",
                     matchCriteriaId: "713DC902-5264-42CB-BB22-3566A4528FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*",
                     matchCriteriaId: "28554810-9989-47B2-9CF1-E421D534777E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD23345-C583-4E30-A9FE-B0C485606ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BBEBBD-8F88-474B-A40B-7270B500AAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7471E5CD-7211-474C-856F-51C199479407",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "E785FA6F-A7BE-46A3-B384-029E55793DDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3A4148-B91B-4799-B055-21F4A7FA74A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "353E8397-B63B-4879-9D3D-610F65929184",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D91D2C07-10D0-49F0-B353-19E34C438CEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18363D9-C7D8-4C9F-9A50-33725FFE6558",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "267E5275-7D50-4EF6-AB1D-7ECA894ED71B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B91A77-76F0-41CA-B23B-69F431F0D1AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F01332-C259-4F3B-ABE9-C34DAC18FC18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9EA80D9-6A3B-42AF-B609-7429755BE504",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "40B500EC-20B8-42D2-A5DF-956C96FBEB12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55B01E2-6783-494E-BCB9-C75D2CA042D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D31A976-9C00-42AC-8DA1-D8B39564F456",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90F5756-47A1-4512-848E-3070E42506EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB161B7-D329-41FB-97C3-2C1EB16F74C2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
                     matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
                     matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
                     matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
                     matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
                     matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
                     matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
                     matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
                     matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
                     matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
                     matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
                     matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
                     matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
                     matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
                     matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
                     matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
                     matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
                     matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
                     matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
                     matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
                     matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
                     matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
                     matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
                     matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
                     matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
                     matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
                     matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
                     matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
                     matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
                     matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
                     matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
                     matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "923D2D73-F953-44D2-9A25-E118136E8C5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE2AEDB1-8C35-4210-B045-69216480B384",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "484C1B49-7D90-4360-BE33-C1DAB755ED89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C08FE92E-D97F-40E1-8482-1DA777EBC785",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EBD6720-F788-4FD7-BC7F-AAEFAA137486",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "08032549-991F-465D-8794-21C8ED2C98D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "94514F41-CDCF-4EED-896E-8B5AE7360F0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "27F79141-5702-4157-8D13-FFB1C2F23FA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF8D239C-B3D6-4F08-AF99-E64752B72346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "207507FE-1DC7-4569-A5A9-392290622EC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
                     matchCriteriaId: "15FC32E2-9228-4903-9F0A-AF327A1C2D36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF50D5C4-DFC1-4306-B2C8-09D6788904FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "62783CBF-1299-4045-A0D9-E95E7B385164",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B04C754-50CD-4C8C-B56F-A50944EE5799",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "23BA712E-4516-4823-8E85-6AC24BE3240F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C1303D7-33B3-48AA-BD62-74984AD22AF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
                     matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
                     matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
                     matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
                     matchCriteriaId: "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA5AE231-F198-49EC-8A97-FF250A742840",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6603F-9646-4220-BFCB-81266F1FC60E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E25472-7F96-425C-87DD-D1835B12589E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
                     matchCriteriaId: "09253F55-3355-44C1-862C-9A6DAD5C461C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "32CAE041-761F-4D81-B075-D3E567CFFE94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
                     matchCriteriaId: "843E440C-3847-4B13-BB0C-E0C282853850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
                     matchCriteriaId: "60F6B441-537F-4255-9BC6-CE807B46DC55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E0195D5-380D-401F-92EB-37AEA34E7478",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E6AB8D9-FEA0-4830-941B-A2605830ADD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5427051C-F785-4190-86E4-7F6E226968B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AEABB2-D597-4126-AEA2-D67117E86962",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E84AC40-E06A-42B9-B125-E7263A191702",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1869D54-7B07-400D-8941-59DE0FE4127D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "799CBCB6-5345-433A-9D2A-B36A86178982",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E40BD777-F766-4921-951C-7E38575ADA47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A649B47-E110-4C6C-AE60-13DB543CFE29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
                     matchCriteriaId: "02377127-6C03-4FED-BB51-555B8E0DB223",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "100127DD-4981-46D3-95A7-D5C0585F097E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A216FA06-4E47-4105-8ADE-956F887AFC6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
                     matchCriteriaId: "137DECAA-074A-4FEC-A633-FE3836E0D32B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
                     matchCriteriaId: "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
                     matchCriteriaId: "328F854B-3716-47D9-BE70-765DE3689DAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
                     matchCriteriaId: "D179F530-F642-444C-8184-3770FA8A338E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB237F89-7405-46F7-972E-81A3B78631BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
                     matchCriteriaId: "017FA232-935C-4096-8087-5F90147589C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
                     matchCriteriaId: "B506523F-101E-4F05-82D5-31E37B8B2E8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED47811-5435-43D1-A57F-CA89807A6118",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6799338F-C0F9-4B25-A14C-68C4158B01F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
                     matchCriteriaId: "5461E4AD-2944-46A0-A696-FC32CD069D64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2A76E12-842B-4925-B5F5-53497C3E420F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
                     matchCriteriaId: "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
                     matchCriteriaId: "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
                     matchCriteriaId: "361C2658-F122-4AE9-B67D-4467F29E096D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
                     matchCriteriaId: "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47C2864-4B34-46DD-AABF-9F38B72578AC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B1DB28-A0BE-40C5-BA4D-50354A085893",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*",
                     matchCriteriaId: "47859796-AA68-4E49-A625-9CBB49E5967A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FB51313-4B56-4045-A5A9-A2F2C1D21548",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*",
                     matchCriteriaId: "719CAF85-B1F1-4BF9-9217-6181339B20A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*",
                     matchCriteriaId: "F908E2B8-B4A1-487A-820D-57B1AC437754",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACDAC96E-D749-47E0-8DE4-BA0C74027330",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*",
                     matchCriteriaId: "461A6DF4-EC6D-4DC8-A474-B219AE372FA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B23D94-D9F7-4EDE-9641-CE5670EB78C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F03C408-C457-4306-B26B-D21056B57AB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FB20448-852D-4B59-9517-DCF738140F79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2A6907-9CE2-465C-89EA-F1B84B31768D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3420C39-8177-445E-8501-49A4ED3998BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "049D03CC-7D4A-4D64-A3F4-0138717433CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACED82AA-7C7D-4089-9129-579CC6B063FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*",
                     matchCriteriaId: "24761232-F2C3-421D-A6AB-6FC100FE9B1D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC00AAC-243D-437D-B613-1CF97CA58253",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "832281CF-98D7-42FF-8CF1-97632F8F7834",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE46D028-025E-4D37-9DF6-9BF385246923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*",
                     matchCriteriaId: "3462E847-5100-4C4E-AE79-81D2857280AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F2D80BA-B6EE-451A-9D40-808B20E7B17A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A65D4242-CBA6-413D-846C-72772C96E14D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "238B7D82-E552-46D5-9F66-1363F1610BD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "6424D4A6-732D-4D4E-B099-E38FBFE1CF38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*",
                     matchCriteriaId: "177CA640-399E-4343-8DBB-E105E188CE3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C43C5A6-31B6-4946-90DA-60BBBA03861D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE15099D-6718-4AF8-BA3B-57DE1FE71289",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*",
                     matchCriteriaId: "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1BE9EE-4403-4983-89CD-A85C77846861",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28279AE-D876-4692-A54B-01CCD57AB61D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "E947FE61-02BA-46DB-AD95-692E33F74E6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD67AE51-56B8-473E-B5A3-89753D98481B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*",
                     matchCriteriaId: "47FC1445-5032-4BF1-9A1E-AF078BAC7676",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*",
                     matchCriteriaId: "84181B90-DEEB-4291-86F7-7C65B51FBBEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A72734A-69D0-4FD8-95E8-997BC06B9676",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "92C1C2B4-0431-48B9-AEA9-F6925268DE92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A15B8BA9-3C75-492F-8105-C5F563653A1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*",
                     matchCriteriaId: "D670832E-8CB5-4861-8001-2E317CE7526C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*",
                     matchCriteriaId: "05DEAC21-5D6B-4224-BC50-54368CD9ECA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*",
                     matchCriteriaId: "6213C0D4-B0F4-4156-A467-4F29FA0E6093",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*",
                     matchCriteriaId: "4288A260-F478-46A2-B18D-BD9CD797FE5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "159865EE-8852-4CBE-A3E3-D97C0D9CD89A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*",
                     matchCriteriaId: "1479FE1F-882C-4EA3-A05B-B5901D14D9A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD701852-1959-429B-A631-2FE8390FFA31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F687C73A-35F2-45A2-91E6-A43DCFAD463F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3D433-30D2-4EBB-869A-79BB4B0AA879",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4701873-F7AA-40B8-AFD9-4A60D118574E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
                     matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
                     matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
                     matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
                     matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
                     matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
                     matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
                     matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
                     matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
                     matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
                     matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
                     matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
                     matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
                     matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
                     matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
                     matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
                     matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
                     matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
                     matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
                     matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
                     matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
                     matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
                     matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
                     matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
                     matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
                     matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
                     matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
                     matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
                     matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
                     matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
                     matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
                     matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*",
                     matchCriteriaId: "77447A8E-7EAA-47A2-BA7A-434F7111693B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
                     matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
                     matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
                     matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
                     matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
                     matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
                     matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
                     matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
                     matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
                     matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
                     matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*",
                     matchCriteriaId: "777E076D-285A-4CA5-8886-080BD505DB42",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FC42173-AD0A-40F4-8ECC-17B815F047B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*",
                     matchCriteriaId: "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8CE80B4-02EE-4CF5-B944-860AB16BADC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BACC17D3-E255-4CCD-86BD-AADC9EC48E80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
                     matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
                     matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
                     matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
                     matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
                     matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
                     matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
                     matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
                     matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
                     matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
                     matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
                     matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
                     matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
                     matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
                     matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
                     matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "580DF3D2-C365-43AF-9A48-F173072AA40B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*",
                     matchCriteriaId: "32AD0A43-28BF-48F4-B363-F7A3A1BFE296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A747F9D-9761-4B8E-B01C-42018B25245A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA4CA91-DA96-4466-8969-3570C8E4343A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECF29446-F253-438C-B1EA-B606186855FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*",
                     matchCriteriaId: "C08277EA-676A-4D45-B66D-2488308CDEEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*",
                     matchCriteriaId: "994C51C8-AD87-4CDB-8EBD-4488D7604BA2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en el manipulador de eventos en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podría permitir que un atacante provoque una denegación de servicio (DoS) mediante la misma subred.",
      },
   ],
   id: "CVE-2018-3629",
   lastModified: "2024-11-21T04:05:48.037",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-07-10T21:29:00.887",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041362",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041362",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema IPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0594",
   lastModified: "2024-11-21T04:53:49.270",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:11.457",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Summary
Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0FD2059-FA89-4010-89C3-1B5BD11E882B",
                     versionEndExcluding: "11.8.65",
                     versionStartIncluding: "11.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A856CF2-8F1D-47C1-939A-F86919F3C2D0",
                     versionEndExcluding: "11.11.65",
                     versionStartIncluding: "11.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5",
                     versionEndExcluding: "11.22.65",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FED09AD-4EEE-4D93-A7EA-DC96F706814F",
                     versionEndExcluding: "12.0.35",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.",
      },
      {
         lang: "es",
         value: "La vulnerabilidad de escritura fuera de límites en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir a un usuario autenticado habilitar potencialmente la escalada de privilegios a través del acceso a la red adyacente.",
      },
   ],
   id: "CVE-2019-0096",
   lastModified: "2024-11-21T04:16:13.373",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.2,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 5.1,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.1,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-17T16:29:01.283",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0FD2059-FA89-4010-89C3-1B5BD11E882B",
                     versionEndExcluding: "11.8.65",
                     versionStartIncluding: "11.8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A856CF2-8F1D-47C1-939A-F86919F3C2D0",
                     versionEndExcluding: "11.11.65",
                     versionStartIncluding: "11.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5",
                     versionEndExcluding: "11.22.65",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FED09AD-4EEE-4D93-A7EA-DC96F706814F",
                     versionEndExcluding: "12.0.35",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad por insuficiente validación de entrada en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a través del acceso físico.",
      },
   ],
   id: "CVE-2019-0092",
   lastModified: "2024-11-21T04:16:13.003",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-17T16:29:01.080",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 07:03
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F802F5D5-BAF0-4246-BEAD-9227BF50EE88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Unas credenciales insuficientemente protegidas para Intel(R) AMT e Intel(R) Standard Manageability pueden permitir que un usuario privilegiado permita potencialmente la divulgación de información por medio de acceso local.",
      },
   ],
   id: "CVE-2022-30944",
   lastModified: "2024-11-21T07:03:36.327",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-18T21:15:08.600",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Summary
Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.
Impacted products
Vendor Product Version
intel active_management_technology_firmware *
intel core_2_duo e4300
intel core_2_duo e4400
intel core_2_duo e4500
intel core_2_duo e4600
intel core_2_duo e4700
intel core_2_duo e6300
intel core_2_duo e6320
intel core_2_duo e6400
intel core_2_duo e6420
intel core_2_duo e6540
intel core_2_duo e6550
intel core_2_duo e6600
intel core_2_duo e6700
intel core_2_duo e6750
intel core_2_duo e6850
intel core_2_duo e7200
intel core_2_duo e7300
intel core_2_duo e7400
intel core_2_duo e7500
intel core_2_duo e7600
intel core_2_duo e8190
intel core_2_duo e8200
intel core_2_duo e8300
intel core_2_duo e8400
intel core_2_duo e8500
intel core_2_duo e8600
intel core_2_duo l7200
intel core_2_duo l7300
intel core_2_duo l7400
intel core_2_duo l7500
intel core_2_duo l7700
intel core_2_duo p7350
intel core_2_duo p7370
intel core_2_duo p7450
intel core_2_duo p7550
intel core_2_duo p7570
intel core_2_duo p8400
intel core_2_duo p8600
intel core_2_duo p8700
intel core_2_duo p8800
intel core_2_duo p9500
intel core_2_duo p9600
intel core_2_duo p9700
intel core_2_duo sl9300
intel core_2_duo sl9380
intel core_2_duo sl9400
intel core_2_duo sl9600
intel core_2_duo sp9300
intel core_2_duo sp9400
intel core_2_duo sp9600
intel core_2_duo su9300
intel core_2_duo su9400
intel core_2_duo su9600
intel core_2_duo t5200
intel core_2_duo t5250
intel core_2_duo t5270
intel core_2_duo t5300
intel core_2_duo t5450
intel core_2_duo t5470
intel core_2_duo t5500
intel core_2_duo t5550
intel core_2_duo t5600
intel core_2_duo t5670
intel core_2_duo t5750
intel core_2_duo t5800
intel core_2_duo t5870
intel core_2_duo t6400
intel core_2_duo t6500
intel core_2_duo t6600
intel core_2_duo t6670
intel core_2_duo t7100
intel core_2_duo t7200
intel core_2_duo t7250
intel core_2_duo t7300
intel core_2_duo t7400
intel core_2_duo t7500
intel core_2_duo t7600
intel core_2_duo t7700
intel core_2_duo t7800
intel core_2_duo t8100
intel core_2_duo t8300
intel core_2_duo t9300
intel core_2_duo t9400
intel core_2_duo t9500
intel core_2_duo t9550
intel core_2_duo t9600
intel core_2_duo t9800
intel core_2_duo t9900
intel core_2_duo u7500
intel core_2_duo u7600
intel core_2_duo u7700
intel active_management_technology_firmware *
intel core_i3 4000m
intel core_i3 4005u
intel core_i3 4010u
intel core_i3 4010y
intel core_i3 4012y
intel core_i3 4020y
intel core_i3 4025u
intel core_i3 4030u
intel core_i3 4030y
intel core_i3 4100e
intel core_i3 4100m
intel core_i3 4100u
intel core_i3 4102e
intel core_i3 4110e
intel core_i3 4110m
intel core_i3 4112e
intel core_i3 4120u
intel core_i3 4130
intel core_i3 4130t
intel core_i3 4150
intel core_i3 4150t
intel core_i3 4158u
intel core_i3 4160
intel core_i3 4160t
intel core_i3 4170
intel core_i3 4170t
intel core_i3 4330
intel core_i3 4330t
intel core_i3 4330te
intel core_i3 4340
intel core_i3 4340te
intel core_i3 4350
intel core_i3 4350t
intel core_i3 4360
intel core_i3 4360t
intel core_i3 4370
intel core_i3 4370t
intel core_i5 4200h
intel core_i5 4200m
intel core_i5 4200u
intel core_i5 4200y
intel core_i5 4202y
intel core_i5 4210h
intel core_i5 4210m
intel core_i5 4210u
intel core_i5 4210y
intel core_i5 4220y
intel core_i5 4250u
intel core_i5 4258u
intel core_i5 4260u
intel core_i5 4278u
intel core_i5 4288u
intel core_i5 4300m
intel core_i5 4300u
intel core_i5 4300y
intel core_i5 4302y
intel core_i5 4308u
intel core_i5 4310m
intel core_i5 4310u
intel core_i5 4330m
intel core_i5 4340m
intel core_i5 4350u
intel core_i5 4360u
intel core_i5 4400e
intel core_i5 4402e
intel core_i5 4402ec
intel core_i5 4410e
intel core_i5 4422e
intel core_i5 4430
intel core_i5 4430s
intel core_i5 4440
intel core_i5 4440s
intel core_i5 4460
intel core_i5 4460s
intel core_i5 4460t
intel core_i5 4570
intel core_i5 4570r
intel core_i5 4570s
intel core_i5 4570t
intel core_i5 4570te
intel core_i5 4590
intel core_i5 4590s
intel core_i5 4590t
intel core_i5 4670
intel core_i5 4670k
intel core_i5 4670r
intel core_i5 4670s
intel core_i5 4670t
intel core_i5 4690
intel core_i5 4690k
intel core_i5 4690s
intel core_i5 4690t
intel core_i7 4500u
intel core_i7 4510u
intel core_i7 4550u
intel core_i7 4558u
intel core_i7 4578u
intel core_i7 4600m
intel core_i7 4600u
intel core_i7 4610m
intel core_i7 4610y
intel core_i7 4650u
intel core_i7 4700ec
intel core_i7 4700eq
intel core_i7 4700hq
intel core_i7 4700mq
intel core_i7 4702ec
intel core_i7 4702hq
intel core_i7 4702mq
intel core_i7 4710hq
intel core_i7 4710mq
intel core_i7 4712hq
intel core_i7 4712mq
intel core_i7 4720hq
intel core_i7 4722hq
intel core_i7 4750hq
intel core_i7 4760hq
intel core_i7 4765t
intel core_i7 4770
intel core_i7 4770hq
intel core_i7 4770k
intel core_i7 4770r
intel core_i7 4770s
intel core_i7 4770t
intel core_i7 4770te
intel core_i7 4771
intel core_i7 4785t
intel core_i7 4790
intel core_i7 4790k
intel core_i7 4790s
intel core_i7 4790t
intel core_i7 4800mq
intel core_i7 4810mq
intel core_i7 4850hq
intel core_i7 4860hq
intel core_i7 4870hq
intel core_i7 4900mq
intel core_i7 4910mq
intel core_i7 4950hq
intel core_i7 4960hq
intel core_i7 4980hq
intel active_management_technology_firmware *
intel core_i3 6006u
intel core_i3 6098p
intel core_i3 6100
intel core_i3 6100e
intel core_i3 6100h
intel core_i3 6100t
intel core_i3 6100te
intel core_i3 6100u
intel core_i3 6102e
intel core_i3 6157u
intel core_i3 6167u
intel core_i3 6300
intel core_i3 6300t
intel core_i3 6320
intel core_i5 6200u
intel core_i5 6260u
intel core_i5 6267u
intel core_i5 6287u
intel core_i5 6300hq
intel core_i5 6300u
intel core_i5 6350hq
intel core_i5 6360u
intel core_i5 6400
intel core_i5 6400t
intel core_i5 6402p
intel core_i5 6440eq
intel core_i5 6440hq
intel core_i5 6442eq
intel core_i5 6500
intel core_i5 6500t
intel core_i5 6500te
intel core_i5 6585r
intel core_i5 6600
intel core_i5 6600k
intel core_i5 6600t
intel core_i5 6685r
intel core_i7 6500u
intel core_i7 6560u
intel core_i7 6567u
intel core_i7 6600u
intel core_i7 6650u
intel core_i7 6660u
intel core_i7 6700
intel core_i7 6700hq
intel core_i7 6700k
intel core_i7 6700t
intel core_i7 6700te
intel core_i7 6770hq
intel core_i7 6785r
intel core_i7 6820eq
intel core_i7 6820hk
intel core_i7 6820hq
intel core_i7 6822eq
intel core_i7 6870hq
intel core_i7 6920hq
intel core_i7 6970hq
intel active_management_technology_firmware *
intel core_i3 5005u
intel core_i3 5010u
intel core_i3 5015u
intel core_i3 5020u
intel core_i3 5157u
intel core_i5 5200u
intel core_i5 5250u
intel core_i5 5257u
intel core_i5 5287u
intel core_i5 5300u
intel core_i5 5350h
intel core_i5 5350u
intel core_i5 5575r
intel core_i5 5675c
intel core_i5 5675r
intel core_i7 5500u
intel core_i7 5550u
intel core_i7 5557u
intel core_i7 5600u
intel core_i7 5650u
intel core_i7 5700eq
intel core_i7 5700hq
intel core_i7 5750hq
intel core_i7 5775c
intel core_i7 5775r
intel core_i7 5850eq
intel core_i7 5850hq
intel core_i7 5950hq
intel active_management_technology_firmware *
intel core_i3 7020u
intel core_i3 7100
intel core_i3 7100e
intel core_i3 7100h
intel core_i3 7100t
intel core_i3 7100u
intel core_i3 7101e
intel core_i3 7101te
intel core_i3 7102e
intel core_i3 7130u
intel core_i3 7167u
intel core_i3 7300
intel core_i3 7300t
intel core_i3 7320
intel core_i3 7350k
intel core_i5 7y54
intel core_i5 7y57
intel core_i5 7200u
intel core_i5 7260u
intel core_i5 7267u
intel core_i5 7287u
intel core_i5 7300hq
intel core_i5 7300u
intel core_i5 7360u
intel core_i5 7400
intel core_i5 7400t
intel core_i5 7440eq
intel core_i5 7440hq
intel core_i5 7442eq
intel core_i5 7500
intel core_i5 7500t
intel core_i5 7600
intel core_i5 7600k
intel core_i5 7600t
intel core_i7 7y75
intel core_i7 700t
intel core_i7 7500u
intel core_i7 7560u
intel core_i7 7567u
intel core_i7 7600u
intel core_i7 7660u
intel core_i7 7700
intel core_i7 7700hq
intel core_i7 7700k
intel core_i7 7820eq
intel core_i7 7820hk
intel core_i7 7820hq
intel core_i7 7920hq
intel active_management_technology_firmware *
intel core_i3 8100
intel core_i3 8100h
intel core_i3 8100t
intel core_i3 8109u
intel core_i3 8130u
intel core_i3 8145u
intel core_i3 8300
intel core_i3 8300t
intel core_i3 8350k
intel core_i5 8200y
intel core_i5 8250u
intel core_i5 8259u
intel core_i5 8265u
intel core_i5 8269u
intel core_i5 8300h
intel core_i5 8305g
intel core_i5 8350u
intel core_i5 8400
intel core_i5 8400b
intel core_i5 8400h
intel core_i5 8400t
intel core_i5 8500
intel core_i5 8500b
intel core_i5 8500t
intel core_i5 8600
intel core_i5 8600k
intel core_i5 8600t
intel core_i7 8086k
intel core_i7 8500y
intel core_i7 8550u
intel core_i7 8559u
intel core_i7 8565u
intel core_i7 8650u
intel core_i7 8700
intel core_i7 8700b
intel core_i7 8700k
intel core_i7 8700t
intel core_i7 8705g
intel core_i7 8706g
intel core_i7 8709g
intel core_i7 8750h
intel core_i7 8809g
intel core_i7 8850h
intel core_i9 8950hk
intel active_management_technology_firmware *
intel core_2_extreme qx6700
intel core_2_extreme qx6800
intel core_2_extreme qx6850
intel core_2_extreme qx9300
intel core_2_extreme qx9650
intel core_2_extreme qx9770
intel core_2_extreme qx9775
intel core_2_extreme x6800
intel core_2_extreme x7800
intel core_2_extreme x7900
intel core_2_extreme x9000
intel core_2_extreme x9100
intel core_2_quad q6600
intel core_2_quad q6700
intel core_2_quad q8200
intel core_2_quad q8200s
intel core_2_quad q8300
intel core_2_quad q8400
intel core_2_quad q8400s
intel core_2_quad q9000
intel core_2_quad q9100
intel core_2_quad q9300
intel core_2_quad q9400
intel core_2_quad q9400s
intel core_2_quad q9450
intel core_2_quad q9500
intel core_2_quad q9505
intel core_2_quad q9505s
intel core_2_quad q9550
intel core_2_quad q9550s
intel core_2_quad q9650
intel core_2_solo su3500
intel core_2_solo u2100
intel core_2_solo u2200
intel core_2_solo ulv_su3300
intel core_2_solo ulv_su3500
intel core_duo l2300
intel core_duo l2400
intel core_duo l2500
intel core_duo t2050
intel core_duo t2250
intel core_duo t2300
intel core_duo t2300e
intel core_duo t2350
intel core_duo t2400
intel core_duo t2450
intel core_duo t2500
intel core_duo t2600
intel core_duo t2700
intel core_duo u2400
intel core_duo u2500
intel core_i3 330e
intel core_i3 330m
intel core_i3 330um
intel core_i3 350m
intel core_i3 370m
intel core_i3 380m
intel core_i3 380um
intel core_i3 390m
intel core_i3 530
intel core_i3 540
intel core_i3 550
intel core_i3 560
intel core_i3 2100
intel core_i3 2100t
intel core_i3 2102
intel core_i3 2105
intel core_i3 2115c
intel core_i3 2120
intel core_i3 2120t
intel core_i3 2125
intel core_i3 2130
intel core_i3 2310e
intel core_i3 2310m
intel core_i3 2312m
intel core_i3 2328m
intel core_i3 2330e
intel core_i3 2330m
intel core_i3 2340ue
intel core_i3 2348m
intel core_i3 2350m
intel core_i3 2357m
intel core_i3 2365m
intel core_i3 2367m
intel core_i3 2370m
intel core_i3 2375m
intel core_i3 2377m
intel core_i3 3110m
intel core_i3 3115c
intel core_i3 3120m
intel core_i3 3120me
intel core_i3 3130m
intel core_i3 3210
intel core_i3 3217u
intel core_i3 3217ue
intel core_i3 3220
intel core_i3 3220t
intel core_i3 3225
intel core_i3 3227u
intel core_i3 3229y
intel core_i3 3240
intel core_i3 3240t
intel core_i3 3245
intel core_i3 3250
intel core_i3 3250t
intel core_i5 430m
intel core_i5 430um
intel core_i5 450m
intel core_i5 460m
intel core_i5 470um
intel core_i5 480m
intel core_i5 520e
intel core_i5 520m
intel core_i5 520um
intel core_i5 540m
intel core_i5 540um
intel core_i5 560m
intel core_i5 560um
intel core_i5 580m
intel core_i5 650
intel core_i5 655k
intel core_i5 660
intel core_i5 661
intel core_i5 670
intel core_i5 680
intel core_i5 750
intel core_i5 750s
intel core_i5 760
intel core_i5 2300
intel core_i5 2310
intel core_i5 2320
intel core_i5 2380p
intel core_i5 2390t
intel core_i5 2400
intel core_i5 2400s
intel core_i5 2405s
intel core_i5 2410m
intel core_i5 2430m
intel core_i5 2435m
intel core_i5 2450m
intel core_i5 2450p
intel core_i5 2467m
intel core_i5 2500
intel core_i5 2500k
intel core_i5 2500s
intel core_i5 2500t
intel core_i5 2510e
intel core_i5 2515e
intel core_i5 2520m
intel core_i5 2537m
intel core_i5 2540m
intel core_i5 2550k
intel core_i5 2557m
intel core_i5 3210m
intel core_i5 3230m
intel core_i5 3317u
intel core_i5 3320m
intel core_i5 3330
intel core_i5 3330s
intel core_i5 3337u
intel core_i5 3339y
intel core_i5 3340
intel core_i5 3340m
intel core_i5 3340s
intel core_i5 3350p
intel core_i5 3360m
intel core_i5 3380m
intel core_i5 3427u
intel core_i5 3437u
intel core_i5 3439y
intel core_i5 3450_
intel core_i5 3450s
intel core_i5 3470
intel core_i5 3470s
intel core_i5 3470t
intel core_i5 3475s
intel core_i5 3550
intel core_i5 3550s
intel core_i5 3570
intel core_i5 3570k
intel core_i5 3570s
intel core_i5 3570t
intel core_i5 3610me
intel core_i7 610e
intel core_i7 620le
intel core_i7 620lm
intel core_i7 620m
intel core_i7 620ue
intel core_i7 620um
intel core_i7 640lm
intel core_i7 640m
intel core_i7 640um
intel core_i7 660lm
intel core_i7 660ue
intel core_i7 660um
intel core_i7 680um
intel core_i7 720qm
intel core_i7 740qm
intel core_i7 820qm
intel core_i7 840qm
intel core_i7 860
intel core_i7 860s
intel core_i7 870
intel core_i7 870s
intel core_i7 875k
intel core_i7 880
intel core_i7 920
intel core_i7 920xm
intel core_i7 930
intel core_i7 940
intel core_i7 940xm
intel core_i7 950
intel core_i7 960
intel core_i7 965
intel core_i7 970
intel core_i7 975
intel core_i7 980
intel core_i7 980x
intel core_i7 990x
intel core_i7 2600
intel core_i7 2600k
intel core_i7 2600s
intel core_i7 2610ue
intel core_i7 2617m
intel core_i7 2620m
intel core_i7 2629m
intel core_i7 2630qm
intel core_i7 2635qm
intel core_i7 2637m
intel core_i7 2640m
intel core_i7 2649m
intel core_i7 2655le
intel core_i7 2657m
intel core_i7 2670qm
intel core_i7 2675qm
intel core_i7 2677m
intel core_i7 2700k
intel core_i7 2710qe
intel core_i7 2715qe
intel core_i7 2720qm
intel core_i7 2760qm
intel core_i7 2820qm
intel core_i7 2860qm
intel core_i7 2920xm
intel core_i7 2960xm
intel core_i7 3517u
intel core_i7 3517ue
intel core_i7 3520m
intel core_i7 3537u
intel core_i7 3540m
intel core_i7 3555le
intel core_i7 3610qe
intel core_i7 3610qm
intel core_i7 3612qe
intel core_i7 3612qm
intel core_i7 3615qe
intel core_i7 3615qm
intel core_i7 3630qm
intel core_i7 3632qm
intel core_i7 3635qm
intel core_i7 3667u
intel core_i7 3687u
intel core_i7 3689y
intel core_i7 3720qm
intel core_i7 3740qm
intel core_i7 3770
intel core_i7 3770k
intel core_i7 3770s
intel core_i7 3770t
intel core_i7 3820qm
intel core_i7 3840qm
intel core_solo t1250
intel core_solo t1300
intel core_solo t1350
intel core_solo t1400
intel core_solo u1300
intel core_solo u1400
intel core_solo u1500
intel active_management_technology_firmware *
intel xeon_gold 5115
intel xeon_gold 5118
intel xeon_gold 5119t
intel xeon_gold 5120
intel xeon_gold 5120t
intel xeon_gold 5122
intel xeon_gold 6126
intel xeon_gold 6126f
intel xeon_gold 6126t
intel xeon_gold 6128
intel xeon_gold 6130
intel xeon_gold 6130f
intel xeon_gold 6130t
intel xeon_gold 6132
intel xeon_gold 6134
intel xeon_gold 6134m
intel xeon_gold 6136
intel xeon_gold 6138
intel xeon_gold 6138f
intel xeon_gold 6138t
intel xeon_gold 6140
intel xeon_gold 6140m
intel xeon_gold 6142
intel xeon_gold 6142f
intel xeon_gold 6142m
intel xeon_gold 6144
intel xeon_gold 6146
intel xeon_gold 6148
intel xeon_gold 6148f
intel xeon_gold 6150
intel xeon_gold 6152
intel xeon_gold 6154
intel xeon_platinum 8153
intel xeon_platinum 8156
intel xeon_platinum 8158
intel xeon_platinum 8160
intel xeon_platinum 8160f
intel xeon_platinum 8160m
intel xeon_platinum 8160t
intel xeon_platinum 8164
intel xeon_platinum 8168
intel xeon_platinum 8170
intel xeon_platinum 8170m
intel xeon_platinum 8176
intel xeon_platinum 8176f
intel xeon_platinum 8176m
intel xeon_platinum 8180
intel xeon_silver 4108
intel xeon_silver 4109t
intel xeon_silver 4110
intel xeon_silver 4112
intel xeon_silver 4114
intel xeon_silver 4114t
intel xeon_silver 4116
intel xeon_silver 4116t
intel active_management_technology_firmware *
intel xeon w2123
intel xeon w2125
intel xeon w2133
intel xeon w2135
intel xeon w2145
intel xeon w2155
intel xeon w2175
intel xeon w2195



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F249992-79C7-4005-9804-97FFFAC658E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*",
                     matchCriteriaId: "81C6DAFF-FD39-434C-8426-4BE5F39355EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE259EF-22F6-4AA1-BDF6-448E15B96F14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFED12C9-2563-4036-BEBC-DD9D67095917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*",
                     matchCriteriaId: "18155178-43F1-48A6-AC0E-9578031F7F04",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C47688B-1D40-4D73-B363-E2E8230588FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BF929E-1288-448A-83A4-D26D86D26EF9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8E4CB07-1768-4C18-ACAD-73773042C752",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*",
                     matchCriteriaId: "31465D8E-A705-4AE3-AB2A-C296554E514C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8B2D356-DD32-46E0-9459-67E10AE44104",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDF6AC-7356-417F-84F6-33E9E3AA2082",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8E6F0AF-78AC-4257-9164-A9A4CCA05968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA61740-3E29-4820-9897-9BCB90490D49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "633350BA-34B4-4927-82B9-B44D1286D8FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2E687A6-87AA-4F3A-98AB-A164EC0EE051",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A8F993-32F4-487A-A33D-814BCDF1FAB7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "09EC7A10-C2AB-4DD4-9C75-073344F635E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C83B3D2-E293-4D33-AE5B-1789466696DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB399F3F-7C6E-463E-B822-A4365A4C290A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5175C41-110B-4C26-80CB-C25DA11F639B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63DAF721-A7E8-4263-869D-D9E100D7C598",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79057F7-72D3-4176-BBDD-E9A362153E66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD65648B-B7DB-432F-8F88-6C624F94F809",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A949D34-E086-4821-B73A-DCCFDD6C5616",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "93055544-064D-46FE-92E4-48F69DDD29B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A98184C-18F5-424C-BB74-9A8094B5992C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*",
                     matchCriteriaId: "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EB52214-6E22-49BF-B2F6-0AA282108E0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E0DA72-76B5-4022-BBFA-B886F0F662CE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F67F016-A068-4079-AAE5-B247BBAE1B2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD57E072-FF46-4637-B7CF-D6C2F3BA8782",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B18E14C-4DC4-4AEB-8792-968D893BA402",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*",
                     matchCriteriaId: "B706F7E4-8169-48A5-86D1-3592D3D9B845",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "808DAAA6-9047-49A1-BC0B-9D4725299CA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "57EFA3F2-5C76-48AF-931F-7463633370A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6FF59F0-9F30-448F-A109-B90FCC513CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "07EFB7B3-772A-476D-B30F-2A442F64928F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A69B9F-EF79-4642-A2A8-75395AD7506E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C6D7877-1990-481F-9CFF-81A2BD39DA6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A17D56F-D53C-4198-B7EF-95BAA4711B3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*",
                     matchCriteriaId: "E13892FB-C1D0-4C46-A171-9D055E58DE0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB830245-29AF-4F0E-9C12-6BED7E76609D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*",
                     matchCriteriaId: "17ACD170-347E-4DF5-AE0D-DF00854480A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B8BCF08-D863-435F-9E70-78C7542A3C0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E57F037-EE11-4148-A214-0650A98A07F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F641F2A7-64C7-43DB-862B-B7117E1B9CBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*",
                     matchCriteriaId: "51086E20-8A3D-4A68-8048-D385865D50FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*",
                     matchCriteriaId: "2621BF41-EFD1-4C8A-9426-A937B68DC71E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*",
                     matchCriteriaId: "713DC902-5264-42CB-BB22-3566A4528FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*",
                     matchCriteriaId: "28554810-9989-47B2-9CF1-E421D534777E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD23345-C583-4E30-A9FE-B0C485606ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BBEBBD-8F88-474B-A40B-7270B500AAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7471E5CD-7211-474C-856F-51C199479407",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "E785FA6F-A7BE-46A3-B384-029E55793DDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3A4148-B91B-4799-B055-21F4A7FA74A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "353E8397-B63B-4879-9D3D-610F65929184",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D91D2C07-10D0-49F0-B353-19E34C438CEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18363D9-C7D8-4C9F-9A50-33725FFE6558",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "267E5275-7D50-4EF6-AB1D-7ECA894ED71B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B91A77-76F0-41CA-B23B-69F431F0D1AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F01332-C259-4F3B-ABE9-C34DAC18FC18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9EA80D9-6A3B-42AF-B609-7429755BE504",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "40B500EC-20B8-42D2-A5DF-956C96FBEB12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55B01E2-6783-494E-BCB9-C75D2CA042D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D31A976-9C00-42AC-8DA1-D8B39564F456",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90F5756-47A1-4512-848E-3070E42506EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB161B7-D329-41FB-97C3-2C1EB16F74C2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
                     matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
                     matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
                     matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
                     matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
                     matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
                     matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
                     matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
                     matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
                     matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
                     matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
                     matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
                     matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
                     matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
                     matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
                     matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
                     matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
                     matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
                     matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
                     matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
                     matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
                     matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
                     matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
                     matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
                     matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
                     matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
                     matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
                     matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
                     matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
                     matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
                     matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
                     matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "923D2D73-F953-44D2-9A25-E118136E8C5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE2AEDB1-8C35-4210-B045-69216480B384",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "484C1B49-7D90-4360-BE33-C1DAB755ED89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C08FE92E-D97F-40E1-8482-1DA777EBC785",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EBD6720-F788-4FD7-BC7F-AAEFAA137486",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "08032549-991F-465D-8794-21C8ED2C98D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "94514F41-CDCF-4EED-896E-8B5AE7360F0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "27F79141-5702-4157-8D13-FFB1C2F23FA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF8D239C-B3D6-4F08-AF99-E64752B72346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "207507FE-1DC7-4569-A5A9-392290622EC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
                     matchCriteriaId: "15FC32E2-9228-4903-9F0A-AF327A1C2D36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF50D5C4-DFC1-4306-B2C8-09D6788904FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "62783CBF-1299-4045-A0D9-E95E7B385164",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B04C754-50CD-4C8C-B56F-A50944EE5799",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "23BA712E-4516-4823-8E85-6AC24BE3240F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C1303D7-33B3-48AA-BD62-74984AD22AF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
                     matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
                     matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
                     matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
                     matchCriteriaId: "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA5AE231-F198-49EC-8A97-FF250A742840",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6603F-9646-4220-BFCB-81266F1FC60E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E25472-7F96-425C-87DD-D1835B12589E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
                     matchCriteriaId: "09253F55-3355-44C1-862C-9A6DAD5C461C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "32CAE041-761F-4D81-B075-D3E567CFFE94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
                     matchCriteriaId: "843E440C-3847-4B13-BB0C-E0C282853850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
                     matchCriteriaId: "60F6B441-537F-4255-9BC6-CE807B46DC55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E0195D5-380D-401F-92EB-37AEA34E7478",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E6AB8D9-FEA0-4830-941B-A2605830ADD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5427051C-F785-4190-86E4-7F6E226968B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AEABB2-D597-4126-AEA2-D67117E86962",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E84AC40-E06A-42B9-B125-E7263A191702",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1869D54-7B07-400D-8941-59DE0FE4127D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "799CBCB6-5345-433A-9D2A-B36A86178982",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E40BD777-F766-4921-951C-7E38575ADA47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A649B47-E110-4C6C-AE60-13DB543CFE29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
                     matchCriteriaId: "02377127-6C03-4FED-BB51-555B8E0DB223",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "100127DD-4981-46D3-95A7-D5C0585F097E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A216FA06-4E47-4105-8ADE-956F887AFC6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
                     matchCriteriaId: "137DECAA-074A-4FEC-A633-FE3836E0D32B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
                     matchCriteriaId: "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
                     matchCriteriaId: "328F854B-3716-47D9-BE70-765DE3689DAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
                     matchCriteriaId: "D179F530-F642-444C-8184-3770FA8A338E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB237F89-7405-46F7-972E-81A3B78631BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
                     matchCriteriaId: "017FA232-935C-4096-8087-5F90147589C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
                     matchCriteriaId: "B506523F-101E-4F05-82D5-31E37B8B2E8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED47811-5435-43D1-A57F-CA89807A6118",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6799338F-C0F9-4B25-A14C-68C4158B01F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
                     matchCriteriaId: "5461E4AD-2944-46A0-A696-FC32CD069D64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2A76E12-842B-4925-B5F5-53497C3E420F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
                     matchCriteriaId: "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
                     matchCriteriaId: "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
                     matchCriteriaId: "361C2658-F122-4AE9-B67D-4467F29E096D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
                     matchCriteriaId: "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47C2864-4B34-46DD-AABF-9F38B72578AC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B1DB28-A0BE-40C5-BA4D-50354A085893",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*",
                     matchCriteriaId: "47859796-AA68-4E49-A625-9CBB49E5967A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FB51313-4B56-4045-A5A9-A2F2C1D21548",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*",
                     matchCriteriaId: "719CAF85-B1F1-4BF9-9217-6181339B20A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*",
                     matchCriteriaId: "F908E2B8-B4A1-487A-820D-57B1AC437754",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACDAC96E-D749-47E0-8DE4-BA0C74027330",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*",
                     matchCriteriaId: "461A6DF4-EC6D-4DC8-A474-B219AE372FA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B23D94-D9F7-4EDE-9641-CE5670EB78C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F03C408-C457-4306-B26B-D21056B57AB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FB20448-852D-4B59-9517-DCF738140F79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2A6907-9CE2-465C-89EA-F1B84B31768D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3420C39-8177-445E-8501-49A4ED3998BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "049D03CC-7D4A-4D64-A3F4-0138717433CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACED82AA-7C7D-4089-9129-579CC6B063FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*",
                     matchCriteriaId: "24761232-F2C3-421D-A6AB-6FC100FE9B1D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC00AAC-243D-437D-B613-1CF97CA58253",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "832281CF-98D7-42FF-8CF1-97632F8F7834",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE46D028-025E-4D37-9DF6-9BF385246923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*",
                     matchCriteriaId: "3462E847-5100-4C4E-AE79-81D2857280AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F2D80BA-B6EE-451A-9D40-808B20E7B17A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A65D4242-CBA6-413D-846C-72772C96E14D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "238B7D82-E552-46D5-9F66-1363F1610BD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "6424D4A6-732D-4D4E-B099-E38FBFE1CF38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*",
                     matchCriteriaId: "177CA640-399E-4343-8DBB-E105E188CE3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C43C5A6-31B6-4946-90DA-60BBBA03861D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE15099D-6718-4AF8-BA3B-57DE1FE71289",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*",
                     matchCriteriaId: "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1BE9EE-4403-4983-89CD-A85C77846861",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28279AE-D876-4692-A54B-01CCD57AB61D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "E947FE61-02BA-46DB-AD95-692E33F74E6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD67AE51-56B8-473E-B5A3-89753D98481B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*",
                     matchCriteriaId: "47FC1445-5032-4BF1-9A1E-AF078BAC7676",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*",
                     matchCriteriaId: "84181B90-DEEB-4291-86F7-7C65B51FBBEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A72734A-69D0-4FD8-95E8-997BC06B9676",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "92C1C2B4-0431-48B9-AEA9-F6925268DE92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A15B8BA9-3C75-492F-8105-C5F563653A1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*",
                     matchCriteriaId: "D670832E-8CB5-4861-8001-2E317CE7526C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*",
                     matchCriteriaId: "05DEAC21-5D6B-4224-BC50-54368CD9ECA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*",
                     matchCriteriaId: "6213C0D4-B0F4-4156-A467-4F29FA0E6093",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*",
                     matchCriteriaId: "4288A260-F478-46A2-B18D-BD9CD797FE5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "159865EE-8852-4CBE-A3E3-D97C0D9CD89A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*",
                     matchCriteriaId: "1479FE1F-882C-4EA3-A05B-B5901D14D9A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD701852-1959-429B-A631-2FE8390FFA31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F687C73A-35F2-45A2-91E6-A43DCFAD463F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3D433-30D2-4EBB-869A-79BB4B0AA879",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4701873-F7AA-40B8-AFD9-4A60D118574E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
                     matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
                     matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
                     matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
                     matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
                     matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
                     matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
                     matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
                     matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
                     matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
                     matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
                     matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
                     matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
                     matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
                     matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
                     matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
                     matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
                     matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
                     matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
                     matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
                     matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
                     matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
                     matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
                     matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
                     matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
                     matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
                     matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
                     matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
                     matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
                     matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
                     matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
                     matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*",
                     matchCriteriaId: "77447A8E-7EAA-47A2-BA7A-434F7111693B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
                     matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
                     matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
                     matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
                     matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
                     matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
                     matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
                     matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
                     matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
                     matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
                     matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*",
                     matchCriteriaId: "777E076D-285A-4CA5-8886-080BD505DB42",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FC42173-AD0A-40F4-8ECC-17B815F047B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*",
                     matchCriteriaId: "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8CE80B4-02EE-4CF5-B944-860AB16BADC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BACC17D3-E255-4CCD-86BD-AADC9EC48E80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
                     matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
                     matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
                     matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
                     matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
                     matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
                     matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
                     matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
                     matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
                     matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
                     matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
                     matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
                     matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
                     matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
                     matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
                     matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F",
                     versionEndIncluding: "11.20",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "580DF3D2-C365-43AF-9A48-F173072AA40B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*",
                     matchCriteriaId: "32AD0A43-28BF-48F4-B363-F7A3A1BFE296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A747F9D-9761-4B8E-B01C-42018B25245A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA4CA91-DA96-4466-8969-3570C8E4343A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECF29446-F253-438C-B1EA-B606186855FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*",
                     matchCriteriaId: "C08277EA-676A-4D45-B66D-2488308CDEEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*",
                     matchCriteriaId: "994C51C8-AD87-4CDB-8EBD-4488D7604BA2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.",
      },
      {
         lang: "es",
         value: "Corrupción de memoria en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10 y 11.20 podría ser provocada por un atacante con permisos de administrador locales en el sistema.",
      },
   ],
   id: "CVE-2018-3632",
   lastModified: "2024-11-21T04:05:48.263",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-07-10T21:29:00.937",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041362",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041362",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
intel active_management_technology_firmware *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E1FE144-A9DA-406B-9BBC-BEEE40061E10",
                     versionEndExcluding: "12.0.35",
                     versionStartIncluding: "12.0.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de validación de entrada insuficiente en el subsistema para Intel (R) AMT anterior a la versión 12.0.35 puede permitir a un usuario privilegiado habilitar potencialmente la denegación de servicio mediante un acceso a la red.",
      },
   ],
   id: "CVE-2019-0097",
   lastModified: "2024-11-21T04:16:13.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-17T16:29:01.360",
   references: [
      {
         source: "secure@intel.com",
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.f5.com/csp/article/K84591451",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Summary
Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27",
                     versionEndExcluding: "11.8.93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8",
                     versionEndExcluding: "11.12.93",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA",
                     versionEndExcluding: "11.22.93",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564",
                     versionEndExcluding: "12.0.92",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5",
                     versionEndExcluding: "14.1.67",
                     versionStartIncluding: "14.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6",
                     versionEndExcluding: "15.0.42",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5",
                     versionEndExcluding: "16.1.25",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "La autenticación incorrecta en el subsistema de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios mediante acceso local.",
      },
   ],
   id: "CVE-2021-33159",
   lastModified: "2025-02-05T21:15:14.210",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.1,
            impactScore: 5.8,
            source: "secure@intel.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-11T16:15:11.440",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada inapropiada en el subsistema para Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio o una divulgación de información por medio de un acceso adyacente",
      },
   ],
   id: "CVE-2020-0532",
   lastModified: "2024-11-21T04:53:41.160",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:10.173",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27",
                     versionEndExcluding: "11.8.93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8",
                     versionEndExcluding: "11.12.93",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA",
                     versionEndExcluding: "11.22.93",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564",
                     versionEndExcluding: "12.0.92",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5",
                     versionEndExcluding: "14.1.67",
                     versionStartIncluding: "14.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6",
                     versionEndExcluding: "15.0.42",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5",
                     versionEndExcluding: "16.1.25",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "La autenticación incorrecta en el firmware de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso a la red.",
      },
   ],
   id: "CVE-2022-29893",
   lastModified: "2025-02-05T21:15:17.623",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "secure@intel.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-11T16:15:14.397",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "Un desbordamiento de enteros en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local",
      },
   ],
   id: "CVE-2020-8760",
   lastModified: "2024-11-21T05:39:23.620",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:18.207",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23AFAB4-B286-4FD6-ABC3-86B2881E271C",
                     versionEndExcluding: "12.0.5",
                     versionStartIncluding: "11.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5FAD938-027A-406F-9E7C-1BFD992839F4",
                     versionEndExcluding: "12.0.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63591E72-6038-4417-BA10-54180507AF0F",
                     versionEndExcluding: "11.0",
                     versionStartIncluding: "9.0.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "503E551C-FC5F-4ABC-8DEA-E360701F0B33",
                     versionEndExcluding: "22.01.06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F546AF-8F80-4E0A-9B92-86E3A1F931C0",
                     versionEndExcluding: "21.01.09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5B6E6B-16A0-4236-AABE-82385B53EC78",
                     versionEndExcluding: "21.01.09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D476D093-4A97-499C-B40D-7A301BC9AA2E",
                     versionEndExcluding: "r1.30.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6A757F1-E478-4A3D-8D5F-C996E176A11A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D",
                     versionEndExcluding: "r1.23.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EB339B5-602F-4AB5-9998-465FDC6ABD6C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "790D244A-AC3D-4BBC-9139-A90048FD375A",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C046182-BB33-41D0-B041-1566B8041917",
                     versionEndExcluding: "19.01.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DE74300-E061-452E-AD1D-6DD7C2C62729",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4A7C13-6F81-4629-9C28-9202028634AE",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93485235-481B-4BAF-BB7A-81BB5AA1BC53",
                     versionEndExcluding: "19.01.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD949046-46E5-48C9-883B-92F04926E8BC",
                     versionEndExcluding: "23.01.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de canal lateral estilo Bleichenbacher en la implementación TLS en Intel Active Management Technology en versiones anteriores a la 12.0.5 podría permitir que un usuario sin autenticar obtenga la clave de sesión TLS por red.",
      },
   ],
   id: "CVE-2018-3616",
   lastModified: "2024-11-21T04:05:46.667",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-09-12T19:29:02.403",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106996",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
Impacted products
Vendor Product Version
intel manageability_engine_firmware *
intel manageability_engine_firmware *
intel manageability_engine_firmware *
intel manageability_engine_firmware 11.0
intel manageability_engine_firmware 11.5
intel manageability_engine_firmware 11.6
intel manageability_engine_firmware 11.7
intel manageability_engine_firmware 11.10
intel manageability_engine_firmware 11.20
intel active_management_technology_firmware -
asus z170-premium_firmware -
asus z170-premium -
asus z170-deluxe_firmware -
asus z170-deluxe -
asus z170-pro_firmware -
asus z170-pro -
asus z170-a_firmware -
asus z170-a -
asus z170-ar_firmware -
asus z170-ar -
asus z170-e_firmware -
asus z170-e -
asus z170-k_firmware -
asus z170-k -
asus z170-p_firmware -
asus z170-p -
asus z170m-plus_firmware -
asus z170m-plus -
asus z170m-plus\/br_firmware -
asus z170m-plus\/br -
asus z170-p_d3_firmware -
asus z170-p_d3 -
asus z170m-e_d3_firmware -
asus z170m-e_d3 -
asus sabertooth_z170_mark_1_firmware -
asus sabertooth_z170_mark_1 -
asus sabertooth_z170_s_firmware -
asus sabertooth_z170_s -
asus rog_maximus_viii_extreme_firmware -
asus rog_maximus_viii_extreme -
asus rog_maximus_viii_ranger_firmware -
asus rog_maximus_viii_ranger -
asus rog_maximus_viii_formula_firmware -
asus rog_maximus_viii_formula -
asus rog_maximus_viii_hero_firmware -
asus rog_maximus_viii_hero -
asus rog_maximus_viii_hero_alpha_firmware -
asus rog_maximus_viii_hero_alpha -
asus rog_maximus_viii_gene_firmware -
asus rog_maximus_viii_gene -
asus rog_maximus_viii_impact_firmware -
asus rog_maximus_viii_impact -
asus z170i_pro_gaming_firmware -
asus z170i_pro_gaming -
asus z170_pro_gaming_firmware -
asus z170_pro_gaming -
asus z170_pro_gaming\/aura_firmware -
asus z170_pro_gaming\/aura -
asus b150_pro_gaming_firmware -
asus b150_pro_gaming -
asus b150_pro_gaming\/aura_firmware -
asus b150_pro_gaming\/aura -
asus b150i_pro_gaming\/wifi\/aura_firmware -
asus b150i_pro_gaming\/wifi\/aura -
asus b150i_pro_gaming\/aura_firmware -
asus b150i_pro_gaming\/aura -
asus b150m_pro_gaming_firmware -
asus b150m_pro_gaming -
asus b150m-a_firmware -
asus b150m-a -
asus b150m-a_d3_firmware -
asus b150m-a_d3 -
asus b150m-c_d3_firmware -
asus b150m-c_d3 -
asus b150-a_firmware -
asus b150-a -
asus b150m-d_firmware -
asus b150m-d -
asus b150m-k_firmware -
asus b150m-k -
asus b150m-plus_firmware -
asus b150m-plus -
asus b150m-f_plus_firmware -
asus b150m-f_plus -
asus b150-plus_firmware -
asus b150-plus -
asus b150m-v_plus_firmware -
asus b150m-v_plus -
asus ex-b150m-v_firmware -
asus ex-b150m-v -
asus ex-b150m-v3_firmware -
asus ex-b150m-v3 -
asus ex-b150m-v5_firmware -
asus ex-b150m-v5 -
asus ex-b150-v7_firmware -
asus ex-b150-v7 -
asus b150-pro_firmware -
asus b150-pro -
asus b150m-a\/m.2_firmware -
asus b150m-a\/m.2 -
asus b150m-c_firmware -
asus b150m-c -
asus b150m-c\/br_firmware -
asus b150m-c\/br -
asus pio-b150m_firmware -
asus pio-b150m -
asus trooper_b150_d3_firmware -
asus trooper_b150_d3 -
asus b150m-plus_d3_firmware -
asus b150m-plus_d3 -
asus b150_pro_gaming_d3_firmware -
asus b150_pro_gaming_d3 -
asus b150m-k_d3_firmware -
asus b150m-k_d3 -
asus b150-pro_d3_firmware -
asus b150-pro_d3 -
asus ex-h110m-v_firmware -
asus ex-h110m-v -
asus ex-h110m-v3_firmware -
asus ex-h110m-v3 -
asus h110i-plus_firmware -
asus h110i-plus -
asus h110m-a\/dp_firmware -
asus h110m-a\/dp -
asus h110m-c_firmware -
asus h110m-c -
asus h110m-c\/br_firmware -
asus h110m-c\/br -
asus h110m-c\/hdmi_firmware -
asus h110m-c\/hdmi -
asus h110m-c\/ps_firmware -
asus h110m-c\/ps -
asus h110m-c2_firmware -
asus h110m-c2 -
asus h110m-c2\/tf_firmware -
asus h110m-c2\/tf -
asus h110m-cs_firmware -
asus h110m-cs -
asus h110m-cs_x_firmware -
asus h110m-cs_x -
asus h110m-cs\/br_firmware -
asus h110m-cs\/br -
asus h110m-d\/exper\/si_firmware -
asus h110m-d\/exper\/si -
asus h110m-k_x_firmware -
asus h110m-k_x -
asus h110m-ks_firmware -
asus h110m-ks -
asus h110m-ks_r1_firmware -
asus h110m-ks_r1 -
asus h110m-p\/dvi_firmware -
asus h110m-p\/dvi -
asus h110m-ts_firmware -
asus h110m-ts -
asus h110-plus_firmware -
asus h110-plus -
asus h110s1_firmware -
asus h110s1 -
asus h110s2_firmware -
asus h110s2 -
asus h110t_firmware -
asus h110t -
asus h110t-a_firmware -
asus h110t-a -
asus h110m-a\/m.2_firmware -
asus h110m-a\/m.2 -
asus h110m-d_firmware -
asus h110m-d -
asus h110m-e_firmware -
asus h110m-e -
asus h110m-e\/m.2_firmware -
asus h110m-e\/m.2 -
asus h110m-f_firmware -
asus h110m-f -
asus h110m-k_firmware -
asus h110m-k -
asus h110m-a_firmware -
asus h110m-a -
asus trooper_h110_d3_firmware -
asus trooper_h110_d3 -
asus h110m-plus_firmware -
asus h110m-plus -
asus h110m-r_firmware -
asus h110m-r -
asus prime_h110m2_firmware -
asus prime_h110m2 -
asus prime_h110m2\/fpt_firmware -
asus prime_h110m2\/fpt -
asus prime_h110m-p_firmware -
asus prime_h110m-p -
asus h110m-k_d3_firmware -
asus h110m-k_d3 -
asus h110m-a_d3_firmware -
asus h110m-a_d3 -
asus h170-pro_firmware -
asus h170-pro -
asus h170i-pro_firmware -
asus h170i-pro -
asus h170_pro_gaming_firmware -
asus h170_pro_gaming -
asus h170m-plus_firmware -
asus h170m-plus -
asus h170-pro\/usb_3.1_firmware -
asus h170-pro\/usb_3.1 -
asus h170m-plus\/br_firmware -
asus h170m-plus\/br -
asus h170-plus_d3_firmware -
asus h170-plus_d3 -
asus h170m-e_d3_firmware -
asus h170m-e_d3 -
asus ex-b250-v7_firmware -
asus ex-b250-v7 -
asus b250_mining_expert_firmware -
asus b250_mining_expert -
asus prime_b250m-d_firmware -
asus prime_b250m-d -
asus prime_b250-a_firmware -
asus prime_b250-a -
asus prime_b250m-a_firmware -
asus prime_b250m-a -
asus prime_b250m-j_firmware -
asus prime_b250m-j -
asus prime_b250m-plus_firmware -
asus prime_b250m-plus -
asus prime_b250-plus_firmware -
asus prime_b250-plus -
asus prime_b250m-k_firmware -
asus prime_b250m-k -
asus prime_b250-pro_firmware -
asus prime_b250-pro -
asus rog_strix_b250i_gaming_firmware -
asus rog_strix_b250i_gaming -
asus rog_strix_b250g_gaming_firmware -
asus rog_strix_b250g_gaming -
asus rog_strix_b250h_gaming_firmware -
asus rog_strix_b250h_gaming -
asus rog_strix_b250f_gaming_firmware -
asus rog_strix_b250f_gaming -
asus b250m-c_pro_firmware -
asus b250m-c_pro -
asus b250m-f_plus_firmware -
asus b250m-f_plus -
asus b250-mr_firmware -
asus b250-mr -
asus b250-s_firmware -
asus b250-s -
asus ex-b250m-v_firmware -
asus ex-b250m-v -
asus ex-b250m-v3_firmware -
asus ex-b250m-v3 -
asus ex-b250m-v5_firmware -
asus ex-b250m-v5 -
asus pio-b250i_firmware -
asus pio-b250i -
asus prime_b250m-c_firmware -
asus prime_b250m-c -
asus prime_b250m-plus\/br_firmware -
asus prime_b250m-plus\/br -
asus prime_h270-pro_firmware -
asus prime_h270-pro -
asus prime_h270-plus_firmware -
asus prime_h270-plus -
asus rog_strix_h270i_gaming_firmware -
asus rog_strix_h270i_gaming -
asus rog_strix_h270f_gaming_firmware -
asus rog_strix_h270f_gaming -
asus prime_h270m-plus_firmware -
asus prime_h270m-plus -
asus rog_maximus_ix_extreme_firmware -
asus rog_maximus_ix_extreme -
asus rog_maximus_ix_formula_firmware -
asus rog_maximus_ix_formula -
asus rog_maximus_ix_code_firmware -
asus rog_maximus_ix_code -
asus rog_maximus_ix_apex_firmware -
asus rog_maximus_ix_apex -
asus rog_maximus_ix_hero_firmware -
asus rog_maximus_ix_hero -
asus prime_z270-a_firmware -
asus prime_z270-a -
asus prime_z270-ar_firmware -
asus prime_z270-ar -
asus rog_strix_z270e_gaming_firmware -
asus rog_strix_z270e_gaming -
asus rog_strix_z270f_gaming_firmware -
asus rog_strix_z270f_gaming -
asus rog_strix_z270g_gaming_firmware -
asus rog_strix_z270g_gaming -
asus rog_strix_z270h_gaming_firmware -
asus rog_strix_z270h_gaming -
asus tuf_z270_mark_1_firmware -
asus tuf_z270_mark_1 -
asus tuf_z270_mark_2_firmware -
asus tuf_z270_mark_2 -
asus rog_strix_z270h_gaming\/k1_firmware -
asus rog_strix_z270h_gaming\/k1 -
asus prime_z270-k_firmware -
asus prime_z270-k -
asus prime_z270-p_firmware -
asus prime_z270-p -
asus rog_strix_z270i_gaming_firmware -
asus rog_strix_z270i_gaming -
asus prime_z270m-plus_firmware -
asus prime_z270m-plus -
asus prime_z270m-plus\/br_firmware -
asus prime_z270m-plus\/br -
asus q170m-c_firmware -
asus q170m-c -
asus q170m-cm-b_firmware -
asus q170m-cm-b -
asus q170s1_firmware -
asus q170s1 -
asus q170t_firmware -
asus q170t -
asus q170t_v2_firmware -
asus q170t_v2 -
asus q170m2_firmware -
asus q170m2 -
asus q170m2\/cdm\/si_firmware -
asus q170m2\/cdm\/si -
asus prime_q270m-c_firmware -
asus prime_q270m-c -
asus q270m-cm-a_firmware -
asus q270m-cm-a -
asus q270-s_firmware -
asus q270-s -
asus prime_j3355i-c_firmware -
asus prime_j3355i-c -
asus rog_maximus_x_hero_firmware -
asus rog_maximus_x_hero -
asus rog_maximus_x_formula_firmware -
asus rog_maximus_x_formula -
asus rog_maximus_x_code_firmware -
asus rog_maximus_x_code -
asus rog_maximus_x_apex_firmware -
asus rog_maximus_x_apex -
asus prime_z370-a_firmware -
asus prime_z370-a -
asus prime_z370-p_firmware -
asus prime_z370-p -
asus tuf_z370-pro_gaming_firmware -
asus tuf_z370-pro_gaming -
asus tuf_z370-plus_gaming_firmware -
asus tuf_z370-plus_gaming -
asus rog_strix_z370-g_gaming_firmware -
asus rog_strix_z370-g_gaming -
asus rog_strix_z370-e_gaming_firmware -
asus rog_strix_z370-e_gaming -
asus rog_strix_z370-f_gaming_firmware -
asus rog_strix_z370-f_gaming -
asus rog_strix_z370-h_gaming_firmware -
asus rog_strix_z370-h_gaming -
asus rog_strix_z370-i_gaming_firmware -
asus rog_strix_z370-i_gaming -
siemens simatic_field_pg_m3_firmware *
siemens simatic_field_pg_m3 -
siemens simatic_field_pg_m4_firmware *
siemens simatic_field_pg_m4 -
siemens simatic_field_pg_m5_firmware *
siemens simatic_field_pg_m5 -
siemens simatic_ipc677c_firmware *
siemens simatic_ipc677c -
siemens simatic_ipc427d_firmware -
siemens simatic_ipc427d -
siemens simatic_ipc427e_firmware *
siemens simatic_ipc427e -
siemens simatic_ipc477d_firmware -
siemens simatic_ipc477d -
siemens simatic_ipc477d_pro_firmware -
siemens simatic_ipc477d_pro -
siemens simatic_ipc477e_firmware *
siemens simatic_ipc477e -
siemens simatic_ipc547d_firmware *
siemens simatic_ipc547d -
siemens simatic_ipc547e_firmware *
siemens simatic_ipc547e -
siemens simatic_ipc627c_firmware *
siemens simatic_ipc627c -
siemens simatic_ipc627d_firmware *
siemens simatic_ipc627d -
siemens simatic_ipc647c_firmware *
siemens simatic_ipc647c -
siemens simatic_ipc647d_firmware *
siemens simatic_ipc647d -
siemens simatic_ipc677d_firmware *
siemens simatic_ipc677d -
siemens simatic_ipc827c_firmware *
siemens simatic_ipc827c -
siemens simatic_ipc827d_firmware *
siemens simatic_ipc827d -
siemens simatic_ipc847c_firmware *
siemens simatic_ipc847c -
siemens simatic_ipc847d_firmware *
siemens simatic_ipc847d -
siemens simatic_itp1000_firmware *
siemens simatic_itp1000 -
siemens simotion_p320-4s_firmware *
siemens simotion_p320-4s -
siemens sinumerik_pcu50.5-c_firmware *
siemens sinumerik_pcu50.5-c -
siemens sinumerik_pcu50.5-p_firmware *
siemens sinumerik_pcu50.5-p -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6",
                     versionEndIncluding: "8.1.71.3608",
                     versionStartIncluding: "8.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "139DA53F-A603-490F-A4E5-44D7A0071CDC",
                     versionEndIncluding: "9.1.41.3024",
                     versionStartIncluding: "9.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA876A3-88C1-43D8-92E0-B21E16D37736",
                     versionEndIncluding: "10.0.55.3000",
                     versionStartIncluding: "10.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "411DC559-E8A9-4BC4-96C6-EA753E54543E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "559DF7F6-F649-4C57-893A-6775F07C31A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2380C5D8-8A58-4279-A3D9-7234C7B1D668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "39EB2D65-90F2-4866-A886-F64DB9C7D2FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "69EF0C50-F104-47CE-89E7-BC37FE1A5717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D764C7C-2C49-4149-9586-5D0140CE00FF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F41472A-BC3D-4226-88AC-975E523C3678",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0AEFB41-300D-4541-90EC-6F736A06A404",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54563F87-598C-4301-95C5-A582A78E3D64",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF442E72-096E-40C0-9258-3E2474545E2C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54781F85-88B1-488F-A33F-442947CDA125",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9606205C-88D0-44BB-8052-1E78C512DEB3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37A4CC55-E868-4174-8FC1-23FBF75A973F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9CE58F-3A49-41B8-B9EC-F901AB83D861",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "277B4C76-D04F-467B-8367-E51F74E21ABE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6701855F-2D7F-4559-A8D1-CF8A8C999B91",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E66B1596-8BAA-4805-8D49-9C42E270B219",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB1F7656-9A1F-409C-BA46-BD1B979C25F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCC3417D-44A9-489F-A440-8D3E75DD3586",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "01833F6B-F38D-439A-B84A-047DBC75F71F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89756DDE-8EA9-4135-BBA8-0707FE3D81B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B7D4616-0DCA-4168-8CF4-7055AA922E2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F309D3DC-E2C2-406C-B742-71CAD9E4A568",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D42A2157-8724-4CF2-88F0-048231320354",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "283B693A-D720-411C-96C9-91E356A97FD5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7868F0B3-ED86-4C00-A227-CFD8A14A0790",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45195F20-5E26-426A-A272-5B6342BD06C3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A77678DA-7926-4688-BFC6-9C989985C633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C33821F-3755-4301-B808-806F918FF06F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1763A28F-2ED5-4309-9C02-0587DD2435CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABF49D87-4566-404D-908D-3C5A02B0BE7F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13578BDF-A38D-4357-AD35-41BA988E286B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F716322D-6778-45FD-A4F0-A773A28EA3F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "054E1398-AE98-46AB-B7A6-703F342CC847",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8DCBFE-9482-40F6-9C8F-E4A472767FED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A02FA657-FC01-4795-8246-B777A7A5BCAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23E5CBA9-E946-4F22-A0E9-40A63380E260",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F814D5CE-2F35-4631-BC6C-857CBBD9DC72",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3BE8D64-A47B-4412-AF8A-354D01DB719C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F273293C-6EDA-485E-AA38-A4FE41822171",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77C23914-2AB4-4D6F-A438-F1762F235D92",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22CB8991-762A-46B5-8759-AF453E21FD95",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ED630E-C695-47DD-AABA-39603766CE2A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B17C450-C8E8-4255-8E23-4ABBC8664366",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7800E86-9FAF-4D42-8029-97A22AF87E20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF81798D-F241-499D-84BC-AE647D7DA06A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBBDF56E-375F-439E-A1A7-1D94523C6DF7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06F70FB-E259-4957-9D86-88805F8C0753",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91597904-8647-4109-864D-5EC577A22C55",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E32C912D-CF86-4A1B-B440-E61B3B24886C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B266B9C5-DB7D-41B4-BD43-F50A45B8688C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "109745AA-5210-49EE-93E2-2660FE605273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3990C807-1EA1-42FD-9C38-7B28E99B9630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFDA852-209E-49BB-9793-F2E26FAE785F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60AB4DAC-E806-4772-96C8-F7C68930AA24",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED6011C6-C8CC-426A-BBB3-AA2698A191DA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75E4F53F-65C2-4254-AB16-51EB04CF10DD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F0F3C11-8700-4472-ADD5-462EAC571A5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6381EE22-DFF3-4197-96C6-1B448D6AC9C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DC8BB48-0826-45F6-B5E5-06FB66995E69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82068A08-B5D9-4A79-B81E-2249543175D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "723BF580-21B0-4FD4-8F43-F609AFD53B0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A94BE221-3E91-492F-9BCB-2538B6812400",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72FD9041-A1BF-4483-B9C2-70F8AB00C162",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A763DB3-F4AB-4696-B49B-9EC929E4B17A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30B7BF90-6D37-4211-9AC5-27F82D6DAE46",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D3A85B3-0576-4D31-A088-EBBEF429B2F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBF463BA-68F0-46C5-A948-EA233A7B493E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10021E63-ED8B-4C5D-9559-93DA26469611",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6BEA-C713-4394-A894-AC40053E4FD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3202BBE4-8BC9-4266-89E1-02EC58034284",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09432C60-8EC9-4FF9-9633-FF8779A5F9B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49991ED2-1D79-4148-8F05-DE224ADC5181",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30643353-C9AC-494F-B34D-4226042910CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B96870-A832-46FF-AF3F-169C486464B4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "820B589F-9D3E-4D9C-8112-C11E28F9271E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8645FCEC-625F-4540-843D-CB56FBFABDBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE36CBA-3C04-463E-A21A-1F489D755896",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21888815-D392-4E6D-A831-F2C170E4BE8D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B7FD9B-4FD1-4B60-8394-F51A8446D901",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72749164-D3A3-4F10-80FC-331FB6705899",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CFFAE60-468F-4861-AED3-76EAF9676E19",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DFC293D-73DA-4048-A89D-92092D7BE42E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5847BEF-CD8B-4B2C-A015-847CE9611EB0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF1D362C-359D-455E-BBEF-9B77838419B8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B21217-FC88-4AA0-A4AA-49E98A30122C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E18DCD2A-3F80-461A-A04D-7BF084438E07",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9229F19B-E8A3-44A0-862C-BE7DE7264018",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49098E76-F811-451A-8D7F-1B40491A2278",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DE58681-7681-4729-A9AC-FB1317FE1168",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B400E0-1526-4C46-A60D-84D468B1911E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1204092-3B5B-4243-A0F6-B16C5C661F77",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E71E3A13-644B-491C-97AA-688DA9214561",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38472135-237B-4EE1-8D66-D94B6F3FCFD4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F4CBF7-CBA2-438A-A997-ACDB83322F2C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "767EE0C3-16EC-4D40-A86D-B14586EF9AD5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B122984-8F1E-4CBE-A127-2C7AA5BE1178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE17F92F-990E-4080-BEE0-9549FBDAAE0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13D9955B-57E0-404B-B677-0F0CBAB17606",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61CFCE10-117B-4596-9EC8-0FD763D83445",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "801129A7-C8A2-4D90-9C54-13FAC9B96762",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA55C126-A4D3-48D5-A277-772923EAA7DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927D8CBD-EF57-48E2-A80C-E27907E72CED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A74624-952E-4342-BABF-9E59DE71A633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F8B2CA4-B41E-4900-8F85-80A472670868",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE12AD23-6AC5-4F08-B1B1-E59F728E9668",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B532EC-7D68-4F05-9C84-EB074A85A764",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97E501F-0C7F-4BA0-B04C-C8A623F7156F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75E4DEB7-3F0F-4C62-991B-5A75B27696AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9810952-332C-4849-BB12-1253AF76E1BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3779667-7513-44D8-B2E5-1925594AD3E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C795E996-2996-4731-A78E-FFA9585DCD31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2058E0D4-EAEB-4CD1-AD89-BC69858B734A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "558AF38E-674A-49B5-A023-2043C89714E8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5E83F44-B421-4B24-BE8D-561D57883E54",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38AAA664-8BC3-413F-BB92-8BB6B3690EDB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F53F8B-379A-416E-A44D-38ED9499A120",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C47313A-2FBA-49AD-AD68-5F817411D994",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0232650-B917-4734-B322-D12ADB06B435",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70A3F2A5-56BF-41E8-959B-0AFFCC130361",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4A88EE-9112-40B0-8A11-4841550B5C3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A4787E-F9CA-45F2-B43A-3C9BAD580204",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D757A98E-209C-4391-9B7B-2CD60D5A4FB8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FC08CFA-0254-41A0-8599-7F1033782B2A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6367721C-A009-45AC-B272-8290A8331284",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9617970B-9C4B-47D3-982D-8200BC52D0E8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E1915CF-2419-4C1B-80B9-8D29D379E1FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "179BC9DB-AA35-4A54-8EB3-1DB295727997",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B8722E-E334-47F3-A3BE-B9AB798A5305",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E65AAA6-B29F-4859-9A99-591F6BD1371C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D182935F-8629-4F9D-925D-A166007B446B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B54A67BA-C862-4BA0-94D2-13362FF2F26B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "975830EE-92F4-4614-9AE8-E9D5DBADE414",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12B0228-80F1-466D-86F2-57F7E7BA4095",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B75FEA3-D643-4348-9FA8-07D3127C8D88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C6C8818-47EC-47B5-980F-5109C56C5C1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E4C230-C8B3-496E-9012-5CF032D420E0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7952968-C3A8-40CA-8000-74B23C112AB0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C05633B-3CD2-429B-9239-DB6F189C8C79",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "87D53057-61DA-498B-B76D-6FB0FD50BF61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E222A3E-2E1E-4B46-A6DC-E91831CEA856",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D149B106-67CF-49A1-AE7D-CE3F3BC3F266",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FC93A9D-E01B-40CD-95C8-A82085358E16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3D7210-68E7-4D3D-B65A-F7C200C07A95",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22F82466-28C5-4495-876C-4697AC0834E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B2BCE6-8BA3-4A11-B030-F571346AB3B2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137F1817-ED86-4371-8553-70D415802E23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB077E96-C7D6-4314-92B3-52ED4B6C10BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF58ED92-6E4B-4130-BAB0-81DA31518E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B037D858-125F-4762-8DA2-09BA7807898D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1297573C-0F72-477A-B85C-0ED65412E893",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "513A1D93-DE0D-4455-95C8-FC7AF72677D2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B4013A-5F8E-47AD-80D5-526A68281515",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "982E919B-4936-4BE3-955C-82FFEE504807",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7415EB-47BE-4F88-8310-9BB1CF0EF299",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04DD6014-6CF9-45AC-8A2E-0AD946B811C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE848FF-BB23-4D4F-AFFF-45EC87315A67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "756F0FED-9E9B-4540-A425-F7534C4BE070",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "918AB13E-43F3-47F2-98FA-56FE89CFB1FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C797373-3D39-45AC-BF51-4D0FF6471D83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D72C50-E023-44FE-B44A-EBB96883F234",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "895AA24B-1419-4E66-8BE1-7D3439496FCB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A2E62F-94DC-4F76-BFB5-96B45E8E3364",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BFF834F-54FD-4427-86BC-59CACB5720EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC5BA59-2868-4066-B557-A337FCBEBAEE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D54BCF0-396D-4AE9-BF98-408A30C23DFA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "712F55B3-C78D-4BB1-AC61-C6789997F830",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE19287-8C71-4161-94C5-B31A2CA907FD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E868B563-75A7-4E94-875F-BC0EA7AA228A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E0A4463-96F7-4516-B91C-DFAFA98358D5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB59C47E-47B5-41C4-A142-E818589D86A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4512943B-7794-454B-A0AD-D1F7C23D00BB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A4EC730-8E50-4274-99F8-B6A57C843546",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89865346-0EC6-4C1C-92CC-231ECE6AF73F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70AAD95-7460-49EE-BA18-4A9826658CDA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "900ECAD1-0290-490E-BB94-82667C13B829",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0760F2E1-5A01-40FC-9A2A-05C769D05986",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20419867-19A3-41D0-AD4E-866B47035EF6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97D572B8-0F2C-48A9-B397-DA1FE92844B7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9941B2B-CE46-4669-947D-2BA09DEF6B1A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE77E05B-54E7-4691-AF93-ADC24AE07D9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34DA5C31-71E8-4CEF-AEFD-0BD468E98870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "118522B5-3E87-4D27-9FC3-13F3AE4651BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6C02BD4-E46B-467A-8441-633933EE57E8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A270BEB2-4073-457B-9E7A-041F25B00A70",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4494A410-658A-4DC7-85C6-3792D4A4636D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6928685-947A-444F-B242-55B30F2BD495",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0170DE0A-DF4E-4881-9C66-9BF005897F12",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F713C93B-03CC-4688-8590-81C84C52D10F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F194921-25DA-40AD-AC77-A5C886E653DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD09D5B3-575A-4941-99DF-C1CCB324EF0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "894292B4-B683-4AE1-ACA0-07E14A7CAB04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78B312D0-771C-4C55-92E7-E19A82201B94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E8466D0-3102-4301-8F34-69FDF5E2F760",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76DB8A91-69F2-4028-AC04-B0FFCCFDD882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C85379BD-1976-43A2-87D0-B690B4A9440F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "369BF713-2229-493B-902C-D23F3DFE504A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DB699E7-4212-46C0-BBA0-A3A08AD6C225",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "072786FB-D929-48A9-BBB7-7EC3899DC9A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA041A0-8103-4742-BA97-FD28DD2EDEE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86C5F146-C7FD-4479-8E11-7443DCEA38ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBCB7188-8D72-4619-9779-73B6586A18E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92B48FFA-7FFE-44AB-9528-0681F631C1FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D402D3D7-319F-45D7-A5A2-8D1972D92F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D75118-242F-454C-97B6-9C50330E82BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F905D6-74DD-4547-82CF-AB43E3DD5AA7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84124C1-41B9-4963-9E2E-F84E356D2EC1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60D56403-47C2-4321-BEB9-E08D392AE2CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A522350E-2FCE-4DFA-A660-7FA0CD1462C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED821805-43F4-4594-8B34-9369A4A51919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E59CD1D-24F8-40DD-BC34-1798B9BFD142",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B55966-2BE6-43B7-B3B1-5AC2E476029D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F80FE467-6745-462E-9602-D99EEFE4496F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5D0B584-4C98-4C58-B098-153A07FA7B7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77D33D60-DE04-4189-A8E6-B453F566970A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "122BD789-E195-48C4-8043-E7C911809AF6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52653418-2D8C-464A-806A-0E5BB7C70C58",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE33B2CC-C64B-4983-928A-BE8332458922",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63602AEB-A984-4556-B7B4-906BF0B1C4CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69CACC60-EF0C-417B-8927-CBFDB90DE31D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D434C2FA-C27E-477F-A82E-4DB6B29F3162",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7FA773-033A-4502-A675-25AA640A9C61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CD3456D-04D8-4269-9971-D9245185FB63",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "801BA881-11C2-4042-87A1-6FDC643F2F39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7710F47C-C723-4F97-8A17-1BA8F1005255",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "93B6459E-CE0C-4344-8D63-C0116AB32796",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B69866D-4F3C-42B3-9B20-62137551CE9C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B346C94B-7A59-47A1-B2F6-A888968B7FE3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F09095A-1795-4FDB-A1B5-5FC584E1191F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88504A31-F003-4344-BD7E-A1D5F0970FB8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D61D6C5-4FB2-410D-A74D-1792054C6C04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5650BA0D-6066-42A2-8062-3FF81009E10B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77F596F0-6418-4D20-86C5-B48B027EC265",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F40FF26-207F-41C7-8E82-7AD6681AE0DD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59E33941-7E24-4FC8-941C-CC62B6B58822",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69369624-8D90-4A2A-8B85-8884AC5CBD28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A851E8E1-B1F0-4083-AFA8-3F59779F0206",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD61F9CE-68E5-481C-9711-B40343FF90CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56E41F36-3579-4AE4-8E7E-20D81962EA79",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233065C5-57E6-40E5-8A52-AE6D6F7196AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A571EB0-25AB-4450-8847-042749CE5F7D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8030ED2-0286-420A-B514-AC986C2700BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E56764-2A59-4B73-89A1-9D391FE33D5A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0520B4BF-4363-4747-86A9-5D481927CF4C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94719387-576F-4949-AA4D-6C8453085EBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA24153A-AE9B-4F76-9DFF-E00AB46744BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53223DBA-DAA1-4942-92D1-68B7647D07AD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E633481-0AD2-4291-8653-FEB3DA5DA279",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "272713A3-B88D-405B-AF30-FC6E90F2E3DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCE784AA-CC5A-4995-92AC-28073BABD832",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8260D7C-031B-489F-A7B9-1DEFC846BCD5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4A56C38-B2C6-4F19-806A-9346190BD7AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1536F2E-3181-4897-8ABD-AB2B939DF992",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD78127D-4BCD-4733-ABC1-D8558BE07C3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1419951-3645-4CBF-8EE0-209DC1727E92",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E78CF821-AFD7-4E76-BB94-A45495ABEC37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "060358B9-3630-421B-9366-F726D19C15D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8678C89-35A9-4256-AF4A-CC3A11BDB540",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1579A407-454F-4838-8850-8D4057507C8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A138826-DC79-4620-9142-2B7030DFCEAA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F050E14C-429C-421D-A01C-CC8E1DB40769",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "087C89AA-9876-4754-B2B1-CAE4F86D1375",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F62BFA52-B89C-410E-9FC6-B6F39825515A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B49B4BB-6D24-43A1-81DF-E786DFA600F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "271701A1-CFD4-4781-9F81-3255D90F8EE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6681601-99E9-492B-86BF-9C3BE23D1E9C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA8A2D55-C766-4E90-BB0E-2D912F17C768",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A15E9E54-0414-4C67-9DCD-181FCF2EE838",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6127C45-E91E-46B7-A806-FC0068575DB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4",
                     versionEndExcluding: "18.01.06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ADAD919-32C1-49D2-A419-C9A803DB6250",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E79A718-EEED-4C35-8B3A-8BDEFBC55282",
                     versionEndExcluding: "22.01.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4",
                     versionEndExcluding: "21.01.07",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "631AF2A2-F925-45CB-82DE-39053016F5B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "754A6744-5194-4A99-BD3B-944A8707C80F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2",
                     versionEndExcluding: "21.01.07",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "42E364B9-1FC7-418A-860D-DD0E73DD930E",
                     versionEndExcluding: "7.1.91.3272",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DCF5972-C72D-4DE9-8B73-3C497D54596B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD389CE-AA26-445D-8D2B-27D3D06C3B68",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DD4A97-1648-4C7F-A5A0-6899BD13A617",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1A57A9-F6E5-4672-BD22-09EF5522CA10",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "042B60E7-0614-4EB3-8B47-07DEE5B5E274",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E752006C-6D94-4B14-B3A5-C9BB94141BDB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C5DA136-7541-44E4-B8DF-065CEE065A99",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FFD2D72-5464-4B86-BACB-61F55A081C3A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C37BC27-C5B9-4740-BDFE-9439FB248CE6",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5C3B3FD-7CF7-4172-87EC-11C129D5508A",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "687E1212-EC5A-47BA-ACAB-74F6C98B7C34",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EAE137-9336-43D6-AF8A-9161F236BD14",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2F29FED-7876-4801-B0B1-BC06A30B1310",
                     versionEndExcluding: "23.01.03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AD2CE43-B3B3-480B-A607-BB5817B43256",
                     versionEndExcluding: "17.02.06.83.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A49883F4-8360-4895-8E9E-B274A35BDE57",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF57DC28-0EF6-4610-8B3C-587B79740D25",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E921D034-33C4-4526-8F94-98D580922409",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "578D9CB9-6831-41C5-99C3-E1940562F118",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permite que un atacante con acceso local al sistema ejecute código arbitrario con el privilegio de ejecución AMT.",
      },
   ],
   id: "CVE-2017-5712",
   lastModified: "2024-11-21T03:28:16.610",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-11-21T14:29:00.540",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/101920",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1039852",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/101920",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1039852",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:08
Summary
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17A6A8CF-C605-4C80-B46E-44382ADCA985",
                     versionEndExcluding: "15.0.35",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.",
      },
      {
         lang: "es",
         value: "Una desreferencia de puntero null en el subsistema para Intel(R) AMT versiones anteriores a 15.0.35, puede permitir a un usuario autenticado habilitar potencialmente una denegación de servicio por medio del acceso a la red",
      },
   ],
   id: "CVE-2021-33068",
   lastModified: "2024-11-21T06:08:13.870",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-09T23:15:15.230",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220210-0006/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220210-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Summary
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema en Intel® AMT versiones  anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una divulgación de información por medio de un acceso local",
      },
   ],
   id: "CVE-2020-12356",
   lastModified: "2024-11-21T04:59:33.990",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:14.817",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-10 15:16
Modified
2024-11-21 05:39
Severity ?
Summary
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4162A8B-896F-4B18-8D6D-60320C587744",
                     versionEndExcluding: "11.8.79",
                     versionStartIncluding: "11.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FAA2057-7FF1-4EE0-974F-767E7CF9F239",
                     versionEndExcluding: "11.12.79",
                     versionStartIncluding: "11.12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFE3FF6A-3F10-43F8-8400-653A015E1431",
                     versionEndExcluding: "11.22.79",
                     versionStartIncluding: "11.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C85C642D-DE4F-4052-8549-A5741164C0B3",
                     versionEndExcluding: "12.0.68",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CAAB4E4-FC0B-4B5E-A359-5A5FAF91F135",
                     versionEndExcluding: "14.0.39",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C1C4C98-F1D3-4604-9434-081B02F9AC37",
                     versionEndExcluding: "11.8.79",
                     versionStartIncluding: "11.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4470D98C-163E-4C00-9AFD-EFDA03A520FE",
                     versionEndExcluding: "11.12.79",
                     versionStartIncluding: "11.12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "737C8627-6B2E-4371-AA30-5324F65717E6",
                     versionEndExcluding: "11.22.79",
                     versionStartIncluding: "11.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4EB57A8-E655-4AA9-AEA7-1A7848F743D7",
                     versionEndExcluding: "12.0.68",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A4A1AB1-7557-490A-9B76-2F6F7FEEBF93",
                     versionEndExcluding: "14.0.39",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "Unas restricciones de búfer inapropiadas en el subsistema de red en Intel(R) AMT e Intel(R) ISM aprovisionado versiones anteriores a 11.8.79, 11.12.79, 11.22.79, 12.0.68 y 14.0.39, pueden permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegio por medio del acceso a la red. En sistemas no aprovisionados, un usuario autenticado puede habilitar potencialmente una escalada de privilegios por medio del acceso local",
      },
   ],
   id: "CVE-2020-8758",
   lastModified: "2024-11-21T05:39:23.397",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-10T15:16:53.827",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200911-0005/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200911-0005/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada inapropiada en el subsistema DHCPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0596",
   lastModified: "2024-11-21T04:53:49.500",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:11.597",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "503E551C-FC5F-4ABC-8DEA-E360701F0B33",
                     versionEndExcluding: "22.01.06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F546AF-8F80-4E0A-9B92-86E3A1F931C0",
                     versionEndExcluding: "21.01.09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5B6E6B-16A0-4236-AABE-82385B53EC78",
                     versionEndExcluding: "21.01.09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D476D093-4A97-499C-B40D-7A301BC9AA2E",
                     versionEndExcluding: "r1.30.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6A757F1-E478-4A3D-8D5F-C996E176A11A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D",
                     versionEndExcluding: "r1.23.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EB339B5-602F-4AB5-9998-465FDC6ABD6C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "790D244A-AC3D-4BBC-9139-A90048FD375A",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C046182-BB33-41D0-B041-1566B8041917",
                     versionEndExcluding: "19.01.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DE74300-E061-452E-AD1D-6DD7C2C62729",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4A7C13-6F81-4629-9C28-9202028634AE",
                     versionEndExcluding: "19.02.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93485235-481B-4BAF-BB7A-81BB5AA1BC53",
                     versionEndExcluding: "19.01.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD949046-46E5-48C9-883B-92F04926E8BC",
                     versionEndExcluding: "23.01.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23AFAB4-B286-4FD6-ABC3-86B2881E271C",
                     versionEndExcluding: "12.0.5",
                     versionStartIncluding: "11.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5FAD938-027A-406F-9E7C-1BFD992839F4",
                     versionEndExcluding: "12.0.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63591E72-6038-4417-BA10-54180507AF0F",
                     versionEndExcluding: "11.0",
                     versionStartIncluding: "9.0.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.",
      },
      {
         lang: "es",
         value: "Múltiples desbordamientos de búfer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podrían permitir que un usuario no autenticado con Intel AMT provisionado provoque una denegación de servicio (DoS) parcial mediante acceso de red.",
      },
   ],
   id: "CVE-2018-3658",
   lastModified: "2024-11-21T04:05:51.020",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-09-12T19:29:02.967",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106996",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/106996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Unas credenciales insuficientemente protegidas en Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, pueden permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0540",
   lastModified: "2024-11-21T04:53:42.090",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:11.017",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18CD125-5319-4955-ADEA-24073521E975",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B907926D-451E-4435-AEC2-2E5DBA695AE7",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "564A5BEF-C36A-4D8E-B458-D3083294AFCD",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A433A19A-BBC9-4A5A-8D55-31371F91ABDA",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "Un uso de la memoria previamente liberada del subsistema IPv6 en Intel® AMT e Intel® ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0595",
   lastModified: "2024-11-21T04:53:49.383",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:11.517",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Summary
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products
Vendor Product Version
intel active_management_technology_firmware *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso físico.",
      },
   ],
   id: "CVE-2019-11086",
   lastModified: "2024-11-21T04:20:30.667",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:12.033",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "64F972AA-4420-4983-B0DF-085CAE58E51D",
                     versionEndIncluding: "11.8.76",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "49B19589-FF5A-4908-8317-6E2DDDF40DD0",
                     versionEndIncluding: "11.11.76",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "89D1B44A-5783-480A-BB32-2A96012B5C2A",
                     versionEndIncluding: "11.22.76",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2184BE20-E41F-4FE9-9897-C9BB527B45D0",
                     versionEndIncluding: "12.0.63",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "350276F5-E8F5-4261-B7C5-7662F21782D0",
                     versionEndIncluding: "13.0.31",
                     versionStartIncluding: "13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E73D17-715D-4BA9-9E45-FBC09587973E",
                     versionEndIncluding: "14.0.32",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB0A7300-2C3E-493F-9FC7-95376E2730B3",
                     versionEndIncluding: "11.8.76",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5BFB6EB-4B20-49A3-9307-B905C419554E",
                     versionEndIncluding: "11.11.76",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5538026-BEA0-4764-94BE-D09CFE74FCC5",
                     versionEndIncluding: "11.22.76",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B221B839-F12B-41D3-BB8F-CF552FFA11F3",
                     versionEndIncluding: "12.0.63",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBCF8CDE-05FD-48F7-BE29-68984E401B28",
                     versionEndIncluding: "13.0.31",
                     versionStartIncluding: "13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4AF2ED-BFCB-4DCB-8E9A-CFEF652EDD11",
                     versionEndIncluding: "14.0.32",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema IPv6 en Intel® AMT e Intel® ISM versiones anteriores a 14.0.33, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0597",
   lastModified: "2024-11-21T04:53:49.610",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:11.660",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.synology.com/security/advisory/Synology_SA_20_15",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Summary
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "95326EF3-92B2-476F-AEF9-D4692A49FFAC",
                     versionEndExcluding: "11.8.60",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "572374F4-5C63-4528-BA91-44451C875615",
                     versionEndExcluding: "11.11.60",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117F59A-0D3B-4519-85BC-223EB48A77F8",
                     versionEndExcluding: "11.22.60",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABEE2AC-86FA-4693-BEFA-6FB3B671ECC2",
                     versionEndExcluding: "12.0.20",
                     versionStartIncluding: "12.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.",
      },
      {
         lang: "es",
         value: "Validación de entradas insuficiente en Intel(R) Active Management Technology (Intel(R) AMT), en versiones anteriores a las 11.8.60, 11.11.60, 11.22.60 o 12.0.20, podría permitir que un usuario no autenticado pueda provocar una denegación de servicio mediante acceso de red.",
      },
   ],
   id: "CVE-2018-12187",
   lastModified: "2024-11-21T03:44:43.200",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-03-14T20:29:00.317",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190318-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190318-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
intel active_management_technology_firmware *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios mediante el acceso a la red.",
      },
   ],
   id: "CVE-2019-11107",
   lastModified: "2024-11-21T04:20:33.030",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:12.957",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Summary
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
Impacted products
Vendor Product Version
intel active_management_technology_firmware *
intel core_2_duo e4300
intel core_2_duo e4400
intel core_2_duo e4500
intel core_2_duo e4600
intel core_2_duo e4700
intel core_2_duo e6300
intel core_2_duo e6320
intel core_2_duo e6400
intel core_2_duo e6420
intel core_2_duo e6540
intel core_2_duo e6550
intel core_2_duo e6600
intel core_2_duo e6700
intel core_2_duo e6750
intel core_2_duo e6850
intel core_2_duo e7200
intel core_2_duo e7300
intel core_2_duo e7400
intel core_2_duo e7500
intel core_2_duo e7600
intel core_2_duo e8190
intel core_2_duo e8200
intel core_2_duo e8300
intel core_2_duo e8400
intel core_2_duo e8500
intel core_2_duo e8600
intel core_2_duo l7200
intel core_2_duo l7300
intel core_2_duo l7400
intel core_2_duo l7500
intel core_2_duo l7700
intel core_2_duo p7350
intel core_2_duo p7370
intel core_2_duo p7450
intel core_2_duo p7550
intel core_2_duo p7570
intel core_2_duo p8400
intel core_2_duo p8600
intel core_2_duo p8700
intel core_2_duo p8800
intel core_2_duo p9500
intel core_2_duo p9600
intel core_2_duo p9700
intel core_2_duo sl9300
intel core_2_duo sl9380
intel core_2_duo sl9400
intel core_2_duo sl9600
intel core_2_duo sp9300
intel core_2_duo sp9400
intel core_2_duo sp9600
intel core_2_duo su9300
intel core_2_duo su9400
intel core_2_duo su9600
intel core_2_duo t5200
intel core_2_duo t5250
intel core_2_duo t5270
intel core_2_duo t5300
intel core_2_duo t5450
intel core_2_duo t5470
intel core_2_duo t5500
intel core_2_duo t5550
intel core_2_duo t5600
intel core_2_duo t5670
intel core_2_duo t5750
intel core_2_duo t5800
intel core_2_duo t5870
intel core_2_duo t6400
intel core_2_duo t6500
intel core_2_duo t6600
intel core_2_duo t6670
intel core_2_duo t7100
intel core_2_duo t7200
intel core_2_duo t7250
intel core_2_duo t7300
intel core_2_duo t7400
intel core_2_duo t7500
intel core_2_duo t7600
intel core_2_duo t7700
intel core_2_duo t7800
intel core_2_duo t8100
intel core_2_duo t8300
intel core_2_duo t9300
intel core_2_duo t9400
intel core_2_duo t9500
intel core_2_duo t9550
intel core_2_duo t9600
intel core_2_duo t9800
intel core_2_duo t9900
intel core_2_duo u7500
intel core_2_duo u7600
intel core_2_duo u7700
intel active_management_technology_firmware *
intel core_i3 4000m
intel core_i3 4005u
intel core_i3 4010u
intel core_i3 4010y
intel core_i3 4012y
intel core_i3 4020y
intel core_i3 4025u
intel core_i3 4030u
intel core_i3 4030y
intel core_i3 4100e
intel core_i3 4100m
intel core_i3 4100u
intel core_i3 4102e
intel core_i3 4110e
intel core_i3 4110m
intel core_i3 4112e
intel core_i3 4120u
intel core_i3 4130
intel core_i3 4130t
intel core_i3 4150
intel core_i3 4150t
intel core_i3 4158u
intel core_i3 4160
intel core_i3 4160t
intel core_i3 4170
intel core_i3 4170t
intel core_i3 4330
intel core_i3 4330t
intel core_i3 4330te
intel core_i3 4340
intel core_i3 4340te
intel core_i3 4350
intel core_i3 4350t
intel core_i3 4360
intel core_i3 4360t
intel core_i3 4370
intel core_i3 4370t
intel core_i5 4200h
intel core_i5 4200m
intel core_i5 4200u
intel core_i5 4200y
intel core_i5 4202y
intel core_i5 4210h
intel core_i5 4210m
intel core_i5 4210u
intel core_i5 4210y
intel core_i5 4220y
intel core_i5 4250u
intel core_i5 4258u
intel core_i5 4260u
intel core_i5 4278u
intel core_i5 4288u
intel core_i5 4300m
intel core_i5 4300u
intel core_i5 4300y
intel core_i5 4302y
intel core_i5 4308u
intel core_i5 4310m
intel core_i5 4310u
intel core_i5 4330m
intel core_i5 4340m
intel core_i5 4350u
intel core_i5 4360u
intel core_i5 4400e
intel core_i5 4402e
intel core_i5 4402ec
intel core_i5 4410e
intel core_i5 4422e
intel core_i5 4430
intel core_i5 4430s
intel core_i5 4440
intel core_i5 4440s
intel core_i5 4460
intel core_i5 4460s
intel core_i5 4460t
intel core_i5 4570
intel core_i5 4570r
intel core_i5 4570s
intel core_i5 4570t
intel core_i5 4570te
intel core_i5 4590
intel core_i5 4590s
intel core_i5 4590t
intel core_i5 4670
intel core_i5 4670k
intel core_i5 4670r
intel core_i5 4670s
intel core_i5 4670t
intel core_i5 4690
intel core_i5 4690k
intel core_i5 4690s
intel core_i5 4690t
intel core_i7 4500u
intel core_i7 4510u
intel core_i7 4550u
intel core_i7 4558u
intel core_i7 4578u
intel core_i7 4600m
intel core_i7 4600u
intel core_i7 4610m
intel core_i7 4610y
intel core_i7 4650u
intel core_i7 4700ec
intel core_i7 4700eq
intel core_i7 4700hq
intel core_i7 4700mq
intel core_i7 4702ec
intel core_i7 4702hq
intel core_i7 4702mq
intel core_i7 4710hq
intel core_i7 4710mq
intel core_i7 4712hq
intel core_i7 4712mq
intel core_i7 4720hq
intel core_i7 4722hq
intel core_i7 4750hq
intel core_i7 4760hq
intel core_i7 4765t
intel core_i7 4770
intel core_i7 4770hq
intel core_i7 4770k
intel core_i7 4770r
intel core_i7 4770s
intel core_i7 4770t
intel core_i7 4770te
intel core_i7 4771
intel core_i7 4785t
intel core_i7 4790
intel core_i7 4790k
intel core_i7 4790s
intel core_i7 4790t
intel core_i7 4800mq
intel core_i7 4810mq
intel core_i7 4850hq
intel core_i7 4860hq
intel core_i7 4870hq
intel core_i7 4900mq
intel core_i7 4910mq
intel core_i7 4950hq
intel core_i7 4960hq
intel core_i7 4980hq
intel active_management_technology_firmware *
intel core_i3 6006u
intel core_i3 6098p
intel core_i3 6100
intel core_i3 6100e
intel core_i3 6100h
intel core_i3 6100t
intel core_i3 6100te
intel core_i3 6100u
intel core_i3 6102e
intel core_i3 6157u
intel core_i3 6167u
intel core_i3 6300
intel core_i3 6300t
intel core_i3 6320
intel core_i5 6200u
intel core_i5 6260u
intel core_i5 6267u
intel core_i5 6287u
intel core_i5 6300hq
intel core_i5 6300u
intel core_i5 6350hq
intel core_i5 6360u
intel core_i5 6400
intel core_i5 6400t
intel core_i5 6402p
intel core_i5 6440eq
intel core_i5 6440hq
intel core_i5 6442eq
intel core_i5 6500
intel core_i5 6500t
intel core_i5 6500te
intel core_i5 6585r
intel core_i5 6600
intel core_i5 6600k
intel core_i5 6600t
intel core_i5 6685r
intel core_i7 6500u
intel core_i7 6560u
intel core_i7 6567u
intel core_i7 6600u
intel core_i7 6650u
intel core_i7 6660u
intel core_i7 6700
intel core_i7 6700hq
intel core_i7 6700k
intel core_i7 6700t
intel core_i7 6700te
intel core_i7 6770hq
intel core_i7 6785r
intel core_i7 6820eq
intel core_i7 6820hk
intel core_i7 6820hq
intel core_i7 6822eq
intel core_i7 6870hq
intel core_i7 6920hq
intel core_i7 6970hq
intel active_management_technology_firmware *
intel core_i3 5005u
intel core_i3 5010u
intel core_i3 5015u
intel core_i3 5020u
intel core_i3 5157u
intel core_i5 5200u
intel core_i5 5250u
intel core_i5 5257u
intel core_i5 5287u
intel core_i5 5300u
intel core_i5 5350h
intel core_i5 5350u
intel core_i5 5575r
intel core_i5 5675c
intel core_i5 5675r
intel core_i7 5500u
intel core_i7 5550u
intel core_i7 5557u
intel core_i7 5600u
intel core_i7 5650u
intel core_i7 5700eq
intel core_i7 5700hq
intel core_i7 5750hq
intel core_i7 5775c
intel core_i7 5775r
intel core_i7 5850eq
intel core_i7 5850hq
intel core_i7 5950hq
intel active_management_technology_firmware *
intel core_i3 7020u
intel core_i3 7100
intel core_i3 7100e
intel core_i3 7100h
intel core_i3 7100t
intel core_i3 7100u
intel core_i3 7101e
intel core_i3 7101te
intel core_i3 7102e
intel core_i3 7130u
intel core_i3 7167u
intel core_i3 7300
intel core_i3 7300t
intel core_i3 7320
intel core_i3 7350k
intel core_i5 7y54
intel core_i5 7y57
intel core_i5 7200u
intel core_i5 7260u
intel core_i5 7267u
intel core_i5 7287u
intel core_i5 7300hq
intel core_i5 7300u
intel core_i5 7360u
intel core_i5 7400
intel core_i5 7400t
intel core_i5 7440eq
intel core_i5 7440hq
intel core_i5 7442eq
intel core_i5 7500
intel core_i5 7500t
intel core_i5 7600
intel core_i5 7600k
intel core_i5 7600t
intel core_i7 7y75
intel core_i7 700t
intel core_i7 7500u
intel core_i7 7560u
intel core_i7 7567u
intel core_i7 7600u
intel core_i7 7660u
intel core_i7 7700
intel core_i7 7700hq
intel core_i7 7700k
intel core_i7 7820eq
intel core_i7 7820hk
intel core_i7 7820hq
intel core_i7 7920hq
intel active_management_technology_firmware *
intel core_i3 8100
intel core_i3 8100h
intel core_i3 8100t
intel core_i3 8109u
intel core_i3 8130u
intel core_i3 8145u
intel core_i3 8300
intel core_i3 8300t
intel core_i3 8350k
intel core_i5 8200y
intel core_i5 8250u
intel core_i5 8259u
intel core_i5 8265u
intel core_i5 8269u
intel core_i5 8300h
intel core_i5 8305g
intel core_i5 8350u
intel core_i5 8400
intel core_i5 8400b
intel core_i5 8400h
intel core_i5 8400t
intel core_i5 8500
intel core_i5 8500b
intel core_i5 8500t
intel core_i5 8600
intel core_i5 8600k
intel core_i5 8600t
intel core_i7 8086k
intel core_i7 8500y
intel core_i7 8550u
intel core_i7 8559u
intel core_i7 8565u
intel core_i7 8650u
intel core_i7 8700
intel core_i7 8700b
intel core_i7 8700k
intel core_i7 8700t
intel core_i7 8705g
intel core_i7 8706g
intel core_i7 8709g
intel core_i7 8750h
intel core_i7 8809g
intel core_i7 8850h
intel core_i9 8950hk
intel active_management_technology_firmware *
intel core_2_extreme qx6700
intel core_2_extreme qx6800
intel core_2_extreme qx6850
intel core_2_extreme qx9300
intel core_2_extreme qx9650
intel core_2_extreme qx9770
intel core_2_extreme qx9775
intel core_2_extreme x6800
intel core_2_extreme x7800
intel core_2_extreme x7900
intel core_2_extreme x9000
intel core_2_extreme x9100
intel core_2_quad q6600
intel core_2_quad q6700
intel core_2_quad q8200
intel core_2_quad q8200s
intel core_2_quad q8300
intel core_2_quad q8400
intel core_2_quad q8400s
intel core_2_quad q9000
intel core_2_quad q9100
intel core_2_quad q9300
intel core_2_quad q9400
intel core_2_quad q9400s
intel core_2_quad q9450
intel core_2_quad q9500
intel core_2_quad q9505
intel core_2_quad q9505s
intel core_2_quad q9550
intel core_2_quad q9550s
intel core_2_quad q9650
intel core_2_solo su3500
intel core_2_solo u2100
intel core_2_solo u2200
intel core_2_solo ulv_su3300
intel core_2_solo ulv_su3500
intel core_duo l2300
intel core_duo l2400
intel core_duo l2500
intel core_duo t2050
intel core_duo t2250
intel core_duo t2300
intel core_duo t2300e
intel core_duo t2350
intel core_duo t2400
intel core_duo t2450
intel core_duo t2500
intel core_duo t2600
intel core_duo t2700
intel core_duo u2400
intel core_duo u2500
intel core_i3 330e
intel core_i3 330m
intel core_i3 330um
intel core_i3 350m
intel core_i3 370m
intel core_i3 380m
intel core_i3 380um
intel core_i3 390m
intel core_i3 530
intel core_i3 540
intel core_i3 550
intel core_i3 560
intel core_i3 2100
intel core_i3 2100t
intel core_i3 2102
intel core_i3 2105
intel core_i3 2115c
intel core_i3 2120
intel core_i3 2120t
intel core_i3 2125
intel core_i3 2130
intel core_i3 2310e
intel core_i3 2310m
intel core_i3 2312m
intel core_i3 2328m
intel core_i3 2330e
intel core_i3 2330m
intel core_i3 2340ue
intel core_i3 2348m
intel core_i3 2350m
intel core_i3 2357m
intel core_i3 2365m
intel core_i3 2367m
intel core_i3 2370m
intel core_i3 2375m
intel core_i3 2377m
intel core_i3 3110m
intel core_i3 3115c
intel core_i3 3120m
intel core_i3 3120me
intel core_i3 3130m
intel core_i3 3210
intel core_i3 3217u
intel core_i3 3217ue
intel core_i3 3220
intel core_i3 3220t
intel core_i3 3225
intel core_i3 3227u
intel core_i3 3229y
intel core_i3 3240
intel core_i3 3240t
intel core_i3 3245
intel core_i3 3250
intel core_i3 3250t
intel core_i5 430m
intel core_i5 430um
intel core_i5 450m
intel core_i5 460m
intel core_i5 470um
intel core_i5 480m
intel core_i5 520e
intel core_i5 520m
intel core_i5 520um
intel core_i5 540m
intel core_i5 540um
intel core_i5 560m
intel core_i5 560um
intel core_i5 580m
intel core_i5 650
intel core_i5 655k
intel core_i5 660
intel core_i5 661
intel core_i5 670
intel core_i5 680
intel core_i5 750
intel core_i5 750s
intel core_i5 760
intel core_i5 2300
intel core_i5 2310
intel core_i5 2320
intel core_i5 2380p
intel core_i5 2390t
intel core_i5 2400
intel core_i5 2400s
intel core_i5 2405s
intel core_i5 2410m
intel core_i5 2430m
intel core_i5 2435m
intel core_i5 2450m
intel core_i5 2450p
intel core_i5 2467m
intel core_i5 2500
intel core_i5 2500k
intel core_i5 2500s
intel core_i5 2500t
intel core_i5 2510e
intel core_i5 2515e
intel core_i5 2520m
intel core_i5 2537m
intel core_i5 2540m
intel core_i5 2550k
intel core_i5 2557m
intel core_i5 3210m
intel core_i5 3230m
intel core_i5 3317u
intel core_i5 3320m
intel core_i5 3330
intel core_i5 3330s
intel core_i5 3337u
intel core_i5 3339y
intel core_i5 3340
intel core_i5 3340m
intel core_i5 3340s
intel core_i5 3350p
intel core_i5 3360m
intel core_i5 3380m
intel core_i5 3427u
intel core_i5 3437u
intel core_i5 3439y
intel core_i5 3450_
intel core_i5 3450s
intel core_i5 3470
intel core_i5 3470s
intel core_i5 3470t
intel core_i5 3475s
intel core_i5 3550
intel core_i5 3550s
intel core_i5 3570
intel core_i5 3570k
intel core_i5 3570s
intel core_i5 3570t
intel core_i5 3610me
intel core_i7 610e
intel core_i7 620le
intel core_i7 620lm
intel core_i7 620m
intel core_i7 620ue
intel core_i7 620um
intel core_i7 640lm
intel core_i7 640m
intel core_i7 640um
intel core_i7 660lm
intel core_i7 660ue
intel core_i7 660um
intel core_i7 680um
intel core_i7 720qm
intel core_i7 740qm
intel core_i7 820qm
intel core_i7 840qm
intel core_i7 860
intel core_i7 860s
intel core_i7 870
intel core_i7 870s
intel core_i7 875k
intel core_i7 880
intel core_i7 920
intel core_i7 920xm
intel core_i7 930
intel core_i7 940
intel core_i7 940xm
intel core_i7 950
intel core_i7 960
intel core_i7 965
intel core_i7 970
intel core_i7 975
intel core_i7 980
intel core_i7 980x
intel core_i7 990x
intel core_i7 2600
intel core_i7 2600k
intel core_i7 2600s
intel core_i7 2610ue
intel core_i7 2617m
intel core_i7 2620m
intel core_i7 2629m
intel core_i7 2630qm
intel core_i7 2635qm
intel core_i7 2637m
intel core_i7 2640m
intel core_i7 2649m
intel core_i7 2655le
intel core_i7 2657m
intel core_i7 2670qm
intel core_i7 2675qm
intel core_i7 2677m
intel core_i7 2700k
intel core_i7 2710qe
intel core_i7 2715qe
intel core_i7 2720qm
intel core_i7 2760qm
intel core_i7 2820qm
intel core_i7 2860qm
intel core_i7 2920xm
intel core_i7 2960xm
intel core_i7 3517u
intel core_i7 3517ue
intel core_i7 3520m
intel core_i7 3537u
intel core_i7 3540m
intel core_i7 3555le
intel core_i7 3610qe
intel core_i7 3610qm
intel core_i7 3612qe
intel core_i7 3612qm
intel core_i7 3615qe
intel core_i7 3615qm
intel core_i7 3630qm
intel core_i7 3632qm
intel core_i7 3635qm
intel core_i7 3667u
intel core_i7 3687u
intel core_i7 3689y
intel core_i7 3720qm
intel core_i7 3740qm
intel core_i7 3770
intel core_i7 3770k
intel core_i7 3770s
intel core_i7 3770t
intel core_i7 3820qm
intel core_i7 3840qm
intel core_solo t1250
intel core_solo t1300
intel core_solo t1350
intel core_solo t1400
intel core_solo u1300
intel core_solo u1400
intel core_solo u1500
intel active_management_technology_firmware *
intel xeon_e3_1268l_v5 -
intel xeon_e3_1275_v5 -
intel active_management_technology_firmware *
intel xeon_gold 5115
intel xeon_gold 5118
intel xeon_gold 5119t
intel xeon_gold 5120
intel xeon_gold 5120t
intel xeon_gold 5122
intel xeon_gold 6126
intel xeon_gold 6126f
intel xeon_gold 6126t
intel xeon_gold 6128
intel xeon_gold 6130
intel xeon_gold 6130f
intel xeon_gold 6130t
intel xeon_gold 6132
intel xeon_gold 6134
intel xeon_gold 6134m
intel xeon_gold 6136
intel xeon_gold 6138
intel xeon_gold 6138f
intel xeon_gold 6138t
intel xeon_gold 6140
intel xeon_gold 6140m
intel xeon_gold 6142
intel xeon_gold 6142f
intel xeon_gold 6142m
intel xeon_gold 6144
intel xeon_gold 6146
intel xeon_gold 6148
intel xeon_gold 6148f
intel xeon_gold 6150
intel xeon_gold 6152
intel xeon_gold 6154
intel xeon_platinum 8153
intel xeon_platinum 8156
intel xeon_platinum 8158
intel xeon_platinum 8160
intel xeon_platinum 8160f
intel xeon_platinum 8160m
intel xeon_platinum 8160t
intel xeon_platinum 8164
intel xeon_platinum 8168
intel xeon_platinum 8170
intel xeon_platinum 8170m
intel xeon_platinum 8176
intel xeon_platinum 8176f
intel xeon_platinum 8176m
intel xeon_platinum 8180
intel xeon_silver 4108
intel xeon_silver 4109t
intel xeon_silver 4110
intel xeon_silver 4112
intel xeon_silver 4114
intel xeon_silver 4114t
intel xeon_silver 4116
intel xeon_silver 4116t
intel active_management_technology_firmware *
intel xeon w2123
intel xeon w2125
intel xeon w2133
intel xeon w2135
intel xeon w2145
intel xeon w2155
intel xeon w2175
intel xeon w2195



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F249992-79C7-4005-9804-97FFFAC658E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*",
                     matchCriteriaId: "81C6DAFF-FD39-434C-8426-4BE5F39355EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE259EF-22F6-4AA1-BDF6-448E15B96F14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFED12C9-2563-4036-BEBC-DD9D67095917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*",
                     matchCriteriaId: "18155178-43F1-48A6-AC0E-9578031F7F04",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C47688B-1D40-4D73-B363-E2E8230588FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BF929E-1288-448A-83A4-D26D86D26EF9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8E4CB07-1768-4C18-ACAD-73773042C752",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*",
                     matchCriteriaId: "31465D8E-A705-4AE3-AB2A-C296554E514C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8B2D356-DD32-46E0-9459-67E10AE44104",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDF6AC-7356-417F-84F6-33E9E3AA2082",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8E6F0AF-78AC-4257-9164-A9A4CCA05968",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA61740-3E29-4820-9897-9BCB90490D49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "633350BA-34B4-4927-82B9-B44D1286D8FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2E687A6-87AA-4F3A-98AB-A164EC0EE051",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A8F993-32F4-487A-A33D-814BCDF1FAB7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "09EC7A10-C2AB-4DD4-9C75-073344F635E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C83B3D2-E293-4D33-AE5B-1789466696DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB399F3F-7C6E-463E-B822-A4365A4C290A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5175C41-110B-4C26-80CB-C25DA11F639B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63DAF721-A7E8-4263-869D-D9E100D7C598",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F79057F7-72D3-4176-BBDD-E9A362153E66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD65648B-B7DB-432F-8F88-6C624F94F809",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A949D34-E086-4821-B73A-DCCFDD6C5616",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "93055544-064D-46FE-92E4-48F69DDD29B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A98184C-18F5-424C-BB74-9A8094B5992C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*",
                     matchCriteriaId: "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EB52214-6E22-49BF-B2F6-0AA282108E0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E0DA72-76B5-4022-BBFA-B886F0F662CE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F67F016-A068-4079-AAE5-B247BBAE1B2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD57E072-FF46-4637-B7CF-D6C2F3BA8782",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B18E14C-4DC4-4AEB-8792-968D893BA402",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*",
                     matchCriteriaId: "B706F7E4-8169-48A5-86D1-3592D3D9B845",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "808DAAA6-9047-49A1-BC0B-9D4725299CA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "57EFA3F2-5C76-48AF-931F-7463633370A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6FF59F0-9F30-448F-A109-B90FCC513CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "07EFB7B3-772A-476D-B30F-2A442F64928F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A69B9F-EF79-4642-A2A8-75395AD7506E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C6D7877-1990-481F-9CFF-81A2BD39DA6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A17D56F-D53C-4198-B7EF-95BAA4711B3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*",
                     matchCriteriaId: "E13892FB-C1D0-4C46-A171-9D055E58DE0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB830245-29AF-4F0E-9C12-6BED7E76609D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*",
                     matchCriteriaId: "17ACD170-347E-4DF5-AE0D-DF00854480A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B8BCF08-D863-435F-9E70-78C7542A3C0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E57F037-EE11-4148-A214-0650A98A07F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F641F2A7-64C7-43DB-862B-B7117E1B9CBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*",
                     matchCriteriaId: "51086E20-8A3D-4A68-8048-D385865D50FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*",
                     matchCriteriaId: "2621BF41-EFD1-4C8A-9426-A937B68DC71E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*",
                     matchCriteriaId: "713DC902-5264-42CB-BB22-3566A4528FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*",
                     matchCriteriaId: "28554810-9989-47B2-9CF1-E421D534777E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD23345-C583-4E30-A9FE-B0C485606ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BBEBBD-8F88-474B-A40B-7270B500AAC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7471E5CD-7211-474C-856F-51C199479407",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "E785FA6F-A7BE-46A3-B384-029E55793DDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3A4148-B91B-4799-B055-21F4A7FA74A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "353E8397-B63B-4879-9D3D-610F65929184",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D91D2C07-10D0-49F0-B353-19E34C438CEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "F18363D9-C7D8-4C9F-9A50-33725FFE6558",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "267E5275-7D50-4EF6-AB1D-7ECA894ED71B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B91A77-76F0-41CA-B23B-69F431F0D1AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F01332-C259-4F3B-ABE9-C34DAC18FC18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9EA80D9-6A3B-42AF-B609-7429755BE504",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*",
                     matchCriteriaId: "40B500EC-20B8-42D2-A5DF-956C96FBEB12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55B01E2-6783-494E-BCB9-C75D2CA042D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D31A976-9C00-42AC-8DA1-D8B39564F456",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90F5756-47A1-4512-848E-3070E42506EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB161B7-D329-41FB-97C3-2C1EB16F74C2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
                     matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
                     matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
                     matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
                     matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
                     matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
                     matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
                     matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
                     matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
                     matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
                     matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
                     matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
                     matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
                     matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
                     matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
                     matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
                     matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
                     matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
                     matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
                     matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
                     matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
                     matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
                     matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
                     matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
                     matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
                     matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
                     matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
                     matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
                     matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
                     matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
                     matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
                     matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "923D2D73-F953-44D2-9A25-E118136E8C5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE2AEDB1-8C35-4210-B045-69216480B384",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "484C1B49-7D90-4360-BE33-C1DAB755ED89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C08FE92E-D97F-40E1-8482-1DA777EBC785",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EBD6720-F788-4FD7-BC7F-AAEFAA137486",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "08032549-991F-465D-8794-21C8ED2C98D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "94514F41-CDCF-4EED-896E-8B5AE7360F0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "27F79141-5702-4157-8D13-FFB1C2F23FA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF8D239C-B3D6-4F08-AF99-E64752B72346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "207507FE-1DC7-4569-A5A9-392290622EC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
                     matchCriteriaId: "15FC32E2-9228-4903-9F0A-AF327A1C2D36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF50D5C4-DFC1-4306-B2C8-09D6788904FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "62783CBF-1299-4045-A0D9-E95E7B385164",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B04C754-50CD-4C8C-B56F-A50944EE5799",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "23BA712E-4516-4823-8E85-6AC24BE3240F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C1303D7-33B3-48AA-BD62-74984AD22AF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
                     matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
                     matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
                     matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
                     matchCriteriaId: "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA5AE231-F198-49EC-8A97-FF250A742840",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6603F-9646-4220-BFCB-81266F1FC60E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E25472-7F96-425C-87DD-D1835B12589E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
                     matchCriteriaId: "09253F55-3355-44C1-862C-9A6DAD5C461C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "32CAE041-761F-4D81-B075-D3E567CFFE94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
                     matchCriteriaId: "843E440C-3847-4B13-BB0C-E0C282853850",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
                     matchCriteriaId: "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
                     matchCriteriaId: "60F6B441-537F-4255-9BC6-CE807B46DC55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E0195D5-380D-401F-92EB-37AEA34E7478",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E6AB8D9-FEA0-4830-941B-A2605830ADD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5427051C-F785-4190-86E4-7F6E226968B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AEABB2-D597-4126-AEA2-D67117E86962",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E84AC40-E06A-42B9-B125-E7263A191702",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1869D54-7B07-400D-8941-59DE0FE4127D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
                     matchCriteriaId: "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "799CBCB6-5345-433A-9D2A-B36A86178982",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E40BD777-F766-4921-951C-7E38575ADA47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A649B47-E110-4C6C-AE60-13DB543CFE29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
                     matchCriteriaId: "02377127-6C03-4FED-BB51-555B8E0DB223",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "100127DD-4981-46D3-95A7-D5C0585F097E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A216FA06-4E47-4105-8ADE-956F887AFC6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
                     matchCriteriaId: "137DECAA-074A-4FEC-A633-FE3836E0D32B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
                     matchCriteriaId: "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
                     matchCriteriaId: "328F854B-3716-47D9-BE70-765DE3689DAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
                     matchCriteriaId: "D179F530-F642-444C-8184-3770FA8A338E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB237F89-7405-46F7-972E-81A3B78631BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
                     matchCriteriaId: "017FA232-935C-4096-8087-5F90147589C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
                     matchCriteriaId: "B506523F-101E-4F05-82D5-31E37B8B2E8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED47811-5435-43D1-A57F-CA89807A6118",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6799338F-C0F9-4B25-A14C-68C4158B01F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
                     matchCriteriaId: "5461E4AD-2944-46A0-A696-FC32CD069D64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2A76E12-842B-4925-B5F5-53497C3E420F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
                     matchCriteriaId: "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
                     matchCriteriaId: "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
                     matchCriteriaId: "361C2658-F122-4AE9-B67D-4467F29E096D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
                     matchCriteriaId: "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47C2864-4B34-46DD-AABF-9F38B72578AC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "55B1DB28-A0BE-40C5-BA4D-50354A085893",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*",
                     matchCriteriaId: "47859796-AA68-4E49-A625-9CBB49E5967A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FB51313-4B56-4045-A5A9-A2F2C1D21548",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*",
                     matchCriteriaId: "719CAF85-B1F1-4BF9-9217-6181339B20A2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*",
                     matchCriteriaId: "F908E2B8-B4A1-487A-820D-57B1AC437754",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACDAC96E-D749-47E0-8DE4-BA0C74027330",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*",
                     matchCriteriaId: "461A6DF4-EC6D-4DC8-A474-B219AE372FA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B23D94-D9F7-4EDE-9641-CE5670EB78C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F03C408-C457-4306-B26B-D21056B57AB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FB20448-852D-4B59-9517-DCF738140F79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D2A6907-9CE2-465C-89EA-F1B84B31768D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3420C39-8177-445E-8501-49A4ED3998BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*",
                     matchCriteriaId: "049D03CC-7D4A-4D64-A3F4-0138717433CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACED82AA-7C7D-4089-9129-579CC6B063FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*",
                     matchCriteriaId: "24761232-F2C3-421D-A6AB-6FC100FE9B1D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC00AAC-243D-437D-B613-1CF97CA58253",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "832281CF-98D7-42FF-8CF1-97632F8F7834",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE46D028-025E-4D37-9DF6-9BF385246923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*",
                     matchCriteriaId: "3462E847-5100-4C4E-AE79-81D2857280AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F2D80BA-B6EE-451A-9D40-808B20E7B17A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A65D4242-CBA6-413D-846C-72772C96E14D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*",
                     matchCriteriaId: "238B7D82-E552-46D5-9F66-1363F1610BD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "6424D4A6-732D-4D4E-B099-E38FBFE1CF38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*",
                     matchCriteriaId: "177CA640-399E-4343-8DBB-E105E188CE3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C43C5A6-31B6-4946-90DA-60BBBA03861D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE15099D-6718-4AF8-BA3B-57DE1FE71289",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*",
                     matchCriteriaId: "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B1BE9EE-4403-4983-89CD-A85C77846861",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28279AE-D876-4692-A54B-01CCD57AB61D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "E947FE61-02BA-46DB-AD95-692E33F74E6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD67AE51-56B8-473E-B5A3-89753D98481B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*",
                     matchCriteriaId: "47FC1445-5032-4BF1-9A1E-AF078BAC7676",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*",
                     matchCriteriaId: "84181B90-DEEB-4291-86F7-7C65B51FBBEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A72734A-69D0-4FD8-95E8-997BC06B9676",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "92C1C2B4-0431-48B9-AEA9-F6925268DE92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A15B8BA9-3C75-492F-8105-C5F563653A1C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*",
                     matchCriteriaId: "D670832E-8CB5-4861-8001-2E317CE7526C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*",
                     matchCriteriaId: "05DEAC21-5D6B-4224-BC50-54368CD9ECA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*",
                     matchCriteriaId: "6213C0D4-B0F4-4156-A467-4F29FA0E6093",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*",
                     matchCriteriaId: "4288A260-F478-46A2-B18D-BD9CD797FE5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "159865EE-8852-4CBE-A3E3-D97C0D9CD89A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*",
                     matchCriteriaId: "1479FE1F-882C-4EA3-A05B-B5901D14D9A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD701852-1959-429B-A631-2FE8390FFA31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "F687C73A-35F2-45A2-91E6-A43DCFAD463F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "02D3D433-30D2-4EBB-869A-79BB4B0AA879",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4701873-F7AA-40B8-AFD9-4A60D118574E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
                     matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
                     matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
                     matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
                     matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
                     matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
                     matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
                     matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
                     matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
                     matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
                     matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
                     matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
                     matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
                     matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
                     matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
                     matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
                     matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
                     matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
                     matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
                     matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
                     matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
                     matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
                     matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
                     matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
                     matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
                     matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
                     matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
                     matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
                     matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
                     matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
                     matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
                     matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*",
                     matchCriteriaId: "77447A8E-7EAA-47A2-BA7A-434F7111693B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
                     matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
                     matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
                     matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
                     matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
                     matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
                     matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
                     matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
                     matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
                     matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
                     matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*",
                     matchCriteriaId: "777E076D-285A-4CA5-8886-080BD505DB42",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FC42173-AD0A-40F4-8ECC-17B815F047B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*",
                     matchCriteriaId: "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8CE80B4-02EE-4CF5-B944-860AB16BADC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*",
                     matchCriteriaId: "BACC17D3-E255-4CCD-86BD-AADC9EC48E80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13878C13-1C7C-4B83-AF27-4998E8F659DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
                     matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
                     matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
                     matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
                     matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
                     matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
                     matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
                     matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
                     matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
                     matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
                     matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
                     matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
                     matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
                     matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
                     matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
                     matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A611EBB0-E8E3-4837-87B5-8FD75779CF50",
                     versionEndIncluding: "11.22.70",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "580DF3D2-C365-43AF-9A48-F173072AA40B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*",
                     matchCriteriaId: "32AD0A43-28BF-48F4-B363-F7A3A1BFE296",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A747F9D-9761-4B8E-B01C-42018B25245A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDA4CA91-DA96-4466-8969-3570C8E4343A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECF29446-F253-438C-B1EA-B606186855FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*",
                     matchCriteriaId: "C08277EA-676A-4D45-B66D-2488308CDEEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*",
                     matchCriteriaId: "994C51C8-AD87-4CDB-8EBD-4488D7604BA2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en el manipulador HTTP en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podría permitir que un atacante ejecute código arbitrario mediante la misma subred.",
      },
   ],
   id: "CVE-2018-3628",
   lastModified: "2024-11-21T04:05:47.820",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 8.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-07-10T21:29:00.857",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041362",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041362",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20190327-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:16
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15",
                     versionEndExcluding: "11.8.70",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B",
                     versionEndExcluding: "11.11.70",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43",
                     versionEndExcluding: "11.22.70",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio o una divulgación de información por medio de un acceso adyacente.",
      },
   ],
   id: "CVE-2019-0131",
   lastModified: "2024-11-21T04:16:18.103",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:11.533",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-09-05 19:29
Modified
2024-11-21 03:28
Summary
Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.0.25.3001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C58BB0F4-0CC8-4117-9FBD-842F1A2629A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.0.26.3000:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDA1C111-F4A6-4191-A649-83B8D7E87920",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0.25.3001:*:*:*:*:*:*:*",
                     matchCriteriaId: "88A6B19B-50BD-4EFE-A707-F3557D05D816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0.26.3000:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E412DFA-8C90-4C8C-A281-00A344AEF0FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:small_business_technology_firmware:11.0.25.3001:*:*:*:*:*:*:*",
                     matchCriteriaId: "E975987A-24AC-43B2-8E8D-FCAFF2DFABAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:small_business_technology_firmware:11.0.26.3000:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF3F2A41-56E9-4648-94B8-FBDFCA43B3D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.",
      },
      {
         lang: "es",
         value: "El sistema anti-rollback de Intel Active Management Technology, Intel Standard Manageability e Intel Small Business Technology en sus versiones 11.0.25.3001 y 11.0.26.3000 no evita que se actualice el firmware a la versión 11.6.x.1xxx, la cual es vulnerable a CVE-2017-5689. Esto puede llevarlo a cabo un usuario local con privilegios de administrador.",
      },
   ],
   id: "CVE-2017-5698",
   lastModified: "2024-11-21T03:28:14.687",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               confidentialityImpact: "NONE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:C/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-09-05T19:29:00.217",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 06:57
Summary
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F802F5D5-BAF0-4246-BEAD-9227BF50EE88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
      },
      {
         lang: "es",
         value: "Un control de acceso inapropiado en el firmware para Intel(R) AMT e Intel(R) Standard Manageability puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios por medio del acceso físico.",
      },
   ],
   id: "CVE-2022-28697",
   lastModified: "2024-11-21T06:57:45.567",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-18T21:15:08.467",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221014-0004/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada inapropiada en el subsistema para Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0538",
   lastModified: "2024-11-21T04:53:41.830",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:10.910",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B273234-6A62-430D-AF97-DAE65C7B16EB",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20684D0C-F699-4315-BB60-AAFA5E12D08A",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68AA7FEC-EDAB-408D-B9E3-5DECD205186E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C01525A-E5F1-4F2A-B561-11874BAB7EA1",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85F881D8-37D0-4391-8F95-71A70A4843B0",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema DHCP para Intel® AMT, Intel® ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-8753",
   lastModified: "2024-11-21T05:39:22.920",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:17.830",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15",
                     versionEndExcluding: "11.8.70",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B",
                     versionEndExcluding: "11.11.70",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43",
                     versionEndExcluding: "11.22.70",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso físico.",
      },
   ],
   id: "CVE-2019-11100",
   lastModified: "2024-11-21T04:20:32.197",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:12.410",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local",
      },
   ],
   id: "CVE-2020-8757",
   lastModified: "2024-11-21T05:39:23.303",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:18.127",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
Impacted products
Vendor Product Version
intel manageability_engine_firmware *
intel manageability_engine_firmware *
intel manageability_engine_firmware *
intel manageability_engine_firmware 11.0
intel manageability_engine_firmware 11.5
intel manageability_engine_firmware 11.6
intel manageability_engine_firmware 11.7
intel manageability_engine_firmware 11.10
intel manageability_engine_firmware 11.20
intel active_management_technology_firmware -
asus z170-premium_firmware -
asus z170-premium -
asus z170-deluxe_firmware -
asus z170-deluxe -
asus z170-pro_firmware -
asus z170-pro -
asus z170-a_firmware -
asus z170-a -
asus z170-ar_firmware -
asus z170-ar -
asus z170-e_firmware -
asus z170-e -
asus z170-k_firmware -
asus z170-k -
asus z170-p_firmware -
asus z170-p -
asus z170m-plus_firmware -
asus z170m-plus -
asus z170m-plus\/br_firmware -
asus z170m-plus\/br -
asus z170-p_d3_firmware -
asus z170-p_d3 -
asus z170m-e_d3_firmware -
asus z170m-e_d3 -
asus sabertooth_z170_mark_1_firmware -
asus sabertooth_z170_mark_1 -
asus sabertooth_z170_s_firmware -
asus sabertooth_z170_s -
asus rog_maximus_viii_extreme_firmware -
asus rog_maximus_viii_extreme -
asus rog_maximus_viii_ranger_firmware -
asus rog_maximus_viii_ranger -
asus rog_maximus_viii_formula_firmware -
asus rog_maximus_viii_formula -
asus rog_maximus_viii_hero_firmware -
asus rog_maximus_viii_hero -
asus rog_maximus_viii_hero_alpha_firmware -
asus rog_maximus_viii_hero_alpha -
asus rog_maximus_viii_gene_firmware -
asus rog_maximus_viii_gene -
asus rog_maximus_viii_impact_firmware -
asus rog_maximus_viii_impact -
asus z170i_pro_gaming_firmware -
asus z170i_pro_gaming -
asus z170_pro_gaming_firmware -
asus z170_pro_gaming -
asus z170_pro_gaming\/aura_firmware -
asus z170_pro_gaming\/aura -
asus b150_pro_gaming_firmware -
asus b150_pro_gaming -
asus b150_pro_gaming\/aura_firmware -
asus b150_pro_gaming\/aura -
asus b150i_pro_gaming\/wifi\/aura_firmware -
asus b150i_pro_gaming\/wifi\/aura -
asus b150i_pro_gaming\/aura_firmware -
asus b150i_pro_gaming\/aura -
asus b150m_pro_gaming_firmware -
asus b150m_pro_gaming -
asus b150m-a_firmware -
asus b150m-a -
asus b150m-a_d3_firmware -
asus b150m-a_d3 -
asus b150m-c_d3_firmware -
asus b150m-c_d3 -
asus b150-a_firmware -
asus b150-a -
asus b150m-d_firmware -
asus b150m-d -
asus b150m-k_firmware -
asus b150m-k -
asus b150m-plus_firmware -
asus b150m-plus -
asus b150m-f_plus_firmware -
asus b150m-f_plus -
asus b150-plus_firmware -
asus b150-plus -
asus b150m-v_plus_firmware -
asus b150m-v_plus -
asus ex-b150m-v_firmware -
asus ex-b150m-v -
asus ex-b150m-v3_firmware -
asus ex-b150m-v3 -
asus ex-b150m-v5_firmware -
asus ex-b150m-v5 -
asus ex-b150-v7_firmware -
asus ex-b150-v7 -
asus b150-pro_firmware -
asus b150-pro -
asus b150m-a\/m.2_firmware -
asus b150m-a\/m.2 -
asus b150m-c_firmware -
asus b150m-c -
asus b150m-c\/br_firmware -
asus b150m-c\/br -
asus pio-b150m_firmware -
asus pio-b150m -
asus trooper_b150_d3_firmware -
asus trooper_b150_d3 -
asus b150m-plus_d3_firmware -
asus b150m-plus_d3 -
asus b150_pro_gaming_d3_firmware -
asus b150_pro_gaming_d3 -
asus b150m-k_d3_firmware -
asus b150m-k_d3 -
asus b150-pro_d3_firmware -
asus b150-pro_d3 -
asus ex-h110m-v_firmware -
asus ex-h110m-v -
asus ex-h110m-v3_firmware -
asus ex-h110m-v3 -
asus h110i-plus_firmware -
asus h110i-plus -
asus h110m-a\/dp_firmware -
asus h110m-a\/dp -
asus h110m-c_firmware -
asus h110m-c -
asus h110m-c\/br_firmware -
asus h110m-c\/br -
asus h110m-c\/hdmi_firmware -
asus h110m-c\/hdmi -
asus h110m-c\/ps_firmware -
asus h110m-c\/ps -
asus h110m-c2_firmware -
asus h110m-c2 -
asus h110m-c2\/tf_firmware -
asus h110m-c2\/tf -
asus h110m-cs_firmware -
asus h110m-cs -
asus h110m-cs_x_firmware -
asus h110m-cs_x -
asus h110m-cs\/br_firmware -
asus h110m-cs\/br -
asus h110m-d\/exper\/si_firmware -
asus h110m-d\/exper\/si -
asus h110m-k_x_firmware -
asus h110m-k_x -
asus h110m-ks_firmware -
asus h110m-ks -
asus h110m-ks_r1_firmware -
asus h110m-ks_r1 -
asus h110m-p\/dvi_firmware -
asus h110m-p\/dvi -
asus h110m-ts_firmware -
asus h110m-ts -
asus h110-plus_firmware -
asus h110-plus -
asus h110s1_firmware -
asus h110s1 -
asus h110s2_firmware -
asus h110s2 -
asus h110t_firmware -
asus h110t -
asus h110t-a_firmware -
asus h110t-a -
asus h110m-a\/m.2_firmware -
asus h110m-a\/m.2 -
asus h110m-d_firmware -
asus h110m-d -
asus h110m-e_firmware -
asus h110m-e -
asus h110m-e\/m.2_firmware -
asus h110m-e\/m.2 -
asus h110m-f_firmware -
asus h110m-f -
asus h110m-k_firmware -
asus h110m-k -
asus h110m-a_firmware -
asus h110m-a -
asus trooper_h110_d3_firmware -
asus trooper_h110_d3 -
asus h110m-plus_firmware -
asus h110m-plus -
asus h110m-r_firmware -
asus h110m-r -
asus prime_h110m2_firmware -
asus prime_h110m2 -
asus prime_h110m2\/fpt_firmware -
asus prime_h110m2\/fpt -
asus prime_h110m-p_firmware -
asus prime_h110m-p -
asus h110m-k_d3_firmware -
asus h110m-k_d3 -
asus h110m-a_d3_firmware -
asus h110m-a_d3 -
asus h170-pro_firmware -
asus h170-pro -
asus h170i-pro_firmware -
asus h170i-pro -
asus h170_pro_gaming_firmware -
asus h170_pro_gaming -
asus h170m-plus_firmware -
asus h170m-plus -
asus h170-pro\/usb_3.1_firmware -
asus h170-pro\/usb_3.1 -
asus h170m-plus\/br_firmware -
asus h170m-plus\/br -
asus h170-plus_d3_firmware -
asus h170-plus_d3 -
asus h170m-e_d3_firmware -
asus h170m-e_d3 -
asus ex-b250-v7_firmware -
asus ex-b250-v7 -
asus b250_mining_expert_firmware -
asus b250_mining_expert -
asus prime_b250m-d_firmware -
asus prime_b250m-d -
asus prime_b250-a_firmware -
asus prime_b250-a -
asus prime_b250m-a_firmware -
asus prime_b250m-a -
asus prime_b250m-j_firmware -
asus prime_b250m-j -
asus prime_b250m-plus_firmware -
asus prime_b250m-plus -
asus prime_b250-plus_firmware -
asus prime_b250-plus -
asus prime_b250m-k_firmware -
asus prime_b250m-k -
asus prime_b250-pro_firmware -
asus prime_b250-pro -
asus rog_strix_b250i_gaming_firmware -
asus rog_strix_b250i_gaming -
asus rog_strix_b250g_gaming_firmware -
asus rog_strix_b250g_gaming -
asus rog_strix_b250h_gaming_firmware -
asus rog_strix_b250h_gaming -
asus rog_strix_b250f_gaming_firmware -
asus rog_strix_b250f_gaming -
asus b250m-c_pro_firmware -
asus b250m-c_pro -
asus b250m-f_plus_firmware -
asus b250m-f_plus -
asus b250-mr_firmware -
asus b250-mr -
asus b250-s_firmware -
asus b250-s -
asus ex-b250m-v_firmware -
asus ex-b250m-v -
asus ex-b250m-v3_firmware -
asus ex-b250m-v3 -
asus ex-b250m-v5_firmware -
asus ex-b250m-v5 -
asus pio-b250i_firmware -
asus pio-b250i -
asus prime_b250m-c_firmware -
asus prime_b250m-c -
asus prime_b250m-plus\/br_firmware -
asus prime_b250m-plus\/br -
asus prime_h270-pro_firmware -
asus prime_h270-pro -
asus prime_h270-plus_firmware -
asus prime_h270-plus -
asus rog_strix_h270i_gaming_firmware -
asus rog_strix_h270i_gaming -
asus rog_strix_h270f_gaming_firmware -
asus rog_strix_h270f_gaming -
asus prime_h270m-plus_firmware -
asus prime_h270m-plus -
asus rog_maximus_ix_extreme_firmware -
asus rog_maximus_ix_extreme -
asus rog_maximus_ix_formula_firmware -
asus rog_maximus_ix_formula -
asus rog_maximus_ix_code_firmware -
asus rog_maximus_ix_code -
asus rog_maximus_ix_apex_firmware -
asus rog_maximus_ix_apex -
asus rog_maximus_ix_hero_firmware -
asus rog_maximus_ix_hero -
asus prime_z270-a_firmware -
asus prime_z270-a -
asus prime_z270-ar_firmware -
asus prime_z270-ar -
asus rog_strix_z270e_gaming_firmware -
asus rog_strix_z270e_gaming -
asus rog_strix_z270f_gaming_firmware -
asus rog_strix_z270f_gaming -
asus rog_strix_z270g_gaming_firmware -
asus rog_strix_z270g_gaming -
asus rog_strix_z270h_gaming_firmware -
asus rog_strix_z270h_gaming -
asus tuf_z270_mark_1_firmware -
asus tuf_z270_mark_1 -
asus tuf_z270_mark_2_firmware -
asus tuf_z270_mark_2 -
asus rog_strix_z270h_gaming\/k1_firmware -
asus rog_strix_z270h_gaming\/k1 -
asus prime_z270-k_firmware -
asus prime_z270-k -
asus prime_z270-p_firmware -
asus prime_z270-p -
asus rog_strix_z270i_gaming_firmware -
asus rog_strix_z270i_gaming -
asus prime_z270m-plus_firmware -
asus prime_z270m-plus -
asus prime_z270m-plus\/br_firmware -
asus prime_z270m-plus\/br -
asus q170m-c_firmware -
asus q170m-c -
asus q170m-cm-b_firmware -
asus q170m-cm-b -
asus q170s1_firmware -
asus q170s1 -
asus q170t_firmware -
asus q170t -
asus q170t_v2_firmware -
asus q170t_v2 -
asus q170m2_firmware -
asus q170m2 -
asus q170m2\/cdm\/si_firmware -
asus q170m2\/cdm\/si -
asus prime_q270m-c_firmware -
asus prime_q270m-c -
asus q270m-cm-a_firmware -
asus q270m-cm-a -
asus q270-s_firmware -
asus q270-s -
asus prime_j3355i-c_firmware -
asus prime_j3355i-c -
asus rog_maximus_x_hero_firmware -
asus rog_maximus_x_hero -
asus rog_maximus_x_formula_firmware -
asus rog_maximus_x_formula -
asus rog_maximus_x_code_firmware -
asus rog_maximus_x_code -
asus rog_maximus_x_apex_firmware -
asus rog_maximus_x_apex -
asus prime_z370-a_firmware -
asus prime_z370-a -
asus prime_z370-p_firmware -
asus prime_z370-p -
asus tuf_z370-pro_gaming_firmware -
asus tuf_z370-pro_gaming -
asus tuf_z370-plus_gaming_firmware -
asus tuf_z370-plus_gaming -
asus rog_strix_z370-g_gaming_firmware -
asus rog_strix_z370-g_gaming -
asus rog_strix_z370-e_gaming_firmware -
asus rog_strix_z370-e_gaming -
asus rog_strix_z370-f_gaming_firmware -
asus rog_strix_z370-f_gaming -
asus rog_strix_z370-h_gaming_firmware -
asus rog_strix_z370-h_gaming -
asus rog_strix_z370-i_gaming_firmware -
asus rog_strix_z370-i_gaming -
siemens simatic_field_pg_m3_firmware *
siemens simatic_field_pg_m3 -
siemens simatic_field_pg_m4_firmware *
siemens simatic_field_pg_m4 -
siemens simatic_field_pg_m5_firmware *
siemens simatic_field_pg_m5 -
siemens simatic_ipc677c_firmware *
siemens simatic_ipc677c -
siemens simatic_ipc427d_firmware -
siemens simatic_ipc427d -
siemens simatic_ipc427e_firmware *
siemens simatic_ipc427e -
siemens simatic_ipc477d_firmware -
siemens simatic_ipc477d -
siemens simatic_ipc477d_pro_firmware -
siemens simatic_ipc477d_pro -
siemens simatic_ipc477e_firmware *
siemens simatic_ipc477e -
siemens simatic_ipc547d_firmware *
siemens simatic_ipc547d -
siemens simatic_ipc547e_firmware *
siemens simatic_ipc547e -
siemens simatic_ipc627c_firmware *
siemens simatic_ipc627c -
siemens simatic_ipc627d_firmware *
siemens simatic_ipc627d -
siemens simatic_ipc647c_firmware *
siemens simatic_ipc647c -
siemens simatic_ipc647d_firmware *
siemens simatic_ipc647d -
siemens simatic_ipc677d_firmware *
siemens simatic_ipc677d -
siemens simatic_ipc827c_firmware *
siemens simatic_ipc827c -
siemens simatic_ipc827d_firmware *
siemens simatic_ipc827d -
siemens simatic_ipc847c_firmware *
siemens simatic_ipc847c -
siemens simatic_ipc847d_firmware *
siemens simatic_ipc847d -
siemens simatic_itp1000_firmware *
siemens simatic_itp1000 -
siemens simotion_p320-4s_firmware *
siemens simotion_p320-4s -
siemens sinumerik_pcu50.5-c_firmware *
siemens sinumerik_pcu50.5-c -
siemens sinumerik_pcu50.5-p_firmware *
siemens sinumerik_pcu50.5-p -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6",
                     versionEndIncluding: "8.1.71.3608",
                     versionStartIncluding: "8.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "139DA53F-A603-490F-A4E5-44D7A0071CDC",
                     versionEndIncluding: "9.1.41.3024",
                     versionStartIncluding: "9.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA876A3-88C1-43D8-92E0-B21E16D37736",
                     versionEndIncluding: "10.0.55.3000",
                     versionStartIncluding: "10.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "411DC559-E8A9-4BC4-96C6-EA753E54543E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "559DF7F6-F649-4C57-893A-6775F07C31A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2380C5D8-8A58-4279-A3D9-7234C7B1D668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "39EB2D65-90F2-4866-A886-F64DB9C7D2FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "69EF0C50-F104-47CE-89E7-BC37FE1A5717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D764C7C-2C49-4149-9586-5D0140CE00FF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F41472A-BC3D-4226-88AC-975E523C3678",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0AEFB41-300D-4541-90EC-6F736A06A404",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54563F87-598C-4301-95C5-A582A78E3D64",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF442E72-096E-40C0-9258-3E2474545E2C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54781F85-88B1-488F-A33F-442947CDA125",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9606205C-88D0-44BB-8052-1E78C512DEB3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37A4CC55-E868-4174-8FC1-23FBF75A973F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9CE58F-3A49-41B8-B9EC-F901AB83D861",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "277B4C76-D04F-467B-8367-E51F74E21ABE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6701855F-2D7F-4559-A8D1-CF8A8C999B91",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E66B1596-8BAA-4805-8D49-9C42E270B219",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB1F7656-9A1F-409C-BA46-BD1B979C25F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCC3417D-44A9-489F-A440-8D3E75DD3586",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "01833F6B-F38D-439A-B84A-047DBC75F71F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89756DDE-8EA9-4135-BBA8-0707FE3D81B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B7D4616-0DCA-4168-8CF4-7055AA922E2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F309D3DC-E2C2-406C-B742-71CAD9E4A568",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D42A2157-8724-4CF2-88F0-048231320354",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "283B693A-D720-411C-96C9-91E356A97FD5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7868F0B3-ED86-4C00-A227-CFD8A14A0790",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45195F20-5E26-426A-A272-5B6342BD06C3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A77678DA-7926-4688-BFC6-9C989985C633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C33821F-3755-4301-B808-806F918FF06F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1763A28F-2ED5-4309-9C02-0587DD2435CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABF49D87-4566-404D-908D-3C5A02B0BE7F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13578BDF-A38D-4357-AD35-41BA988E286B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F716322D-6778-45FD-A4F0-A773A28EA3F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "054E1398-AE98-46AB-B7A6-703F342CC847",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8DCBFE-9482-40F6-9C8F-E4A472767FED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A02FA657-FC01-4795-8246-B777A7A5BCAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23E5CBA9-E946-4F22-A0E9-40A63380E260",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F814D5CE-2F35-4631-BC6C-857CBBD9DC72",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3BE8D64-A47B-4412-AF8A-354D01DB719C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F273293C-6EDA-485E-AA38-A4FE41822171",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77C23914-2AB4-4D6F-A438-F1762F235D92",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22CB8991-762A-46B5-8759-AF453E21FD95",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ED630E-C695-47DD-AABA-39603766CE2A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B17C450-C8E8-4255-8E23-4ABBC8664366",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7800E86-9FAF-4D42-8029-97A22AF87E20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF81798D-F241-499D-84BC-AE647D7DA06A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBBDF56E-375F-439E-A1A7-1D94523C6DF7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A06F70FB-E259-4957-9D86-88805F8C0753",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91597904-8647-4109-864D-5EC577A22C55",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E32C912D-CF86-4A1B-B440-E61B3B24886C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B266B9C5-DB7D-41B4-BD43-F50A45B8688C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "109745AA-5210-49EE-93E2-2660FE605273",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3990C807-1EA1-42FD-9C38-7B28E99B9630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFDA852-209E-49BB-9793-F2E26FAE785F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60AB4DAC-E806-4772-96C8-F7C68930AA24",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED6011C6-C8CC-426A-BBB3-AA2698A191DA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75E4F53F-65C2-4254-AB16-51EB04CF10DD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F0F3C11-8700-4472-ADD5-462EAC571A5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6381EE22-DFF3-4197-96C6-1B448D6AC9C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DC8BB48-0826-45F6-B5E5-06FB66995E69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82068A08-B5D9-4A79-B81E-2249543175D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "723BF580-21B0-4FD4-8F43-F609AFD53B0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A94BE221-3E91-492F-9BCB-2538B6812400",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72FD9041-A1BF-4483-B9C2-70F8AB00C162",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A763DB3-F4AB-4696-B49B-9EC929E4B17A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30B7BF90-6D37-4211-9AC5-27F82D6DAE46",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D3A85B3-0576-4D31-A088-EBBEF429B2F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBF463BA-68F0-46C5-A948-EA233A7B493E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10021E63-ED8B-4C5D-9559-93DA26469611",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B91F6BEA-C713-4394-A894-AC40053E4FD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3202BBE4-8BC9-4266-89E1-02EC58034284",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09432C60-8EC9-4FF9-9633-FF8779A5F9B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49991ED2-1D79-4148-8F05-DE224ADC5181",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30643353-C9AC-494F-B34D-4226042910CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B96870-A832-46FF-AF3F-169C486464B4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "820B589F-9D3E-4D9C-8112-C11E28F9271E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8645FCEC-625F-4540-843D-CB56FBFABDBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE36CBA-3C04-463E-A21A-1F489D755896",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21888815-D392-4E6D-A831-F2C170E4BE8D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B7FD9B-4FD1-4B60-8394-F51A8446D901",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72749164-D3A3-4F10-80FC-331FB6705899",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CFFAE60-468F-4861-AED3-76EAF9676E19",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DFC293D-73DA-4048-A89D-92092D7BE42E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5847BEF-CD8B-4B2C-A015-847CE9611EB0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF1D362C-359D-455E-BBEF-9B77838419B8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16B21217-FC88-4AA0-A4AA-49E98A30122C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E18DCD2A-3F80-461A-A04D-7BF084438E07",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9229F19B-E8A3-44A0-862C-BE7DE7264018",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49098E76-F811-451A-8D7F-1B40491A2278",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DE58681-7681-4729-A9AC-FB1317FE1168",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B400E0-1526-4C46-A60D-84D468B1911E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1204092-3B5B-4243-A0F6-B16C5C661F77",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E71E3A13-644B-491C-97AA-688DA9214561",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38472135-237B-4EE1-8D66-D94B6F3FCFD4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F4CBF7-CBA2-438A-A997-ACDB83322F2C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "767EE0C3-16EC-4D40-A86D-B14586EF9AD5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B122984-8F1E-4CBE-A127-2C7AA5BE1178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE17F92F-990E-4080-BEE0-9549FBDAAE0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13D9955B-57E0-404B-B677-0F0CBAB17606",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61CFCE10-117B-4596-9EC8-0FD763D83445",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "801129A7-C8A2-4D90-9C54-13FAC9B96762",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA55C126-A4D3-48D5-A277-772923EAA7DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927D8CBD-EF57-48E2-A80C-E27907E72CED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A74624-952E-4342-BABF-9E59DE71A633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F8B2CA4-B41E-4900-8F85-80A472670868",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE12AD23-6AC5-4F08-B1B1-E59F728E9668",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B532EC-7D68-4F05-9C84-EB074A85A764",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97E501F-0C7F-4BA0-B04C-C8A623F7156F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75E4DEB7-3F0F-4C62-991B-5A75B27696AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9810952-332C-4849-BB12-1253AF76E1BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3779667-7513-44D8-B2E5-1925594AD3E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C795E996-2996-4731-A78E-FFA9585DCD31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2058E0D4-EAEB-4CD1-AD89-BC69858B734A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "558AF38E-674A-49B5-A023-2043C89714E8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5E83F44-B421-4B24-BE8D-561D57883E54",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38AAA664-8BC3-413F-BB92-8BB6B3690EDB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F53F8B-379A-416E-A44D-38ED9499A120",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C47313A-2FBA-49AD-AD68-5F817411D994",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0232650-B917-4734-B322-D12ADB06B435",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70A3F2A5-56BF-41E8-959B-0AFFCC130361",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4A88EE-9112-40B0-8A11-4841550B5C3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A4787E-F9CA-45F2-B43A-3C9BAD580204",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D757A98E-209C-4391-9B7B-2CD60D5A4FB8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FC08CFA-0254-41A0-8599-7F1033782B2A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6367721C-A009-45AC-B272-8290A8331284",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9617970B-9C4B-47D3-982D-8200BC52D0E8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E1915CF-2419-4C1B-80B9-8D29D379E1FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "179BC9DB-AA35-4A54-8EB3-1DB295727997",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1B8722E-E334-47F3-A3BE-B9AB798A5305",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E65AAA6-B29F-4859-9A99-591F6BD1371C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D182935F-8629-4F9D-925D-A166007B446B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B54A67BA-C862-4BA0-94D2-13362FF2F26B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "975830EE-92F4-4614-9AE8-E9D5DBADE414",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12B0228-80F1-466D-86F2-57F7E7BA4095",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B75FEA3-D643-4348-9FA8-07D3127C8D88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C6C8818-47EC-47B5-980F-5109C56C5C1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E4C230-C8B3-496E-9012-5CF032D420E0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7952968-C3A8-40CA-8000-74B23C112AB0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C05633B-3CD2-429B-9239-DB6F189C8C79",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "87D53057-61DA-498B-B76D-6FB0FD50BF61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E222A3E-2E1E-4B46-A6DC-E91831CEA856",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D149B106-67CF-49A1-AE7D-CE3F3BC3F266",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FC93A9D-E01B-40CD-95C8-A82085358E16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3D7210-68E7-4D3D-B65A-F7C200C07A95",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22F82466-28C5-4495-876C-4697AC0834E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B2BCE6-8BA3-4A11-B030-F571346AB3B2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137F1817-ED86-4371-8553-70D415802E23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB077E96-C7D6-4314-92B3-52ED4B6C10BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF58ED92-6E4B-4130-BAB0-81DA31518E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B037D858-125F-4762-8DA2-09BA7807898D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1297573C-0F72-477A-B85C-0ED65412E893",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "513A1D93-DE0D-4455-95C8-FC7AF72677D2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B4013A-5F8E-47AD-80D5-526A68281515",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "982E919B-4936-4BE3-955C-82FFEE504807",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7415EB-47BE-4F88-8310-9BB1CF0EF299",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04DD6014-6CF9-45AC-8A2E-0AD946B811C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE848FF-BB23-4D4F-AFFF-45EC87315A67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "756F0FED-9E9B-4540-A425-F7534C4BE070",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "918AB13E-43F3-47F2-98FA-56FE89CFB1FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C797373-3D39-45AC-BF51-4D0FF6471D83",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3D72C50-E023-44FE-B44A-EBB96883F234",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "895AA24B-1419-4E66-8BE1-7D3439496FCB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A2E62F-94DC-4F76-BFB5-96B45E8E3364",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BFF834F-54FD-4427-86BC-59CACB5720EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC5BA59-2868-4066-B557-A337FCBEBAEE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D54BCF0-396D-4AE9-BF98-408A30C23DFA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "712F55B3-C78D-4BB1-AC61-C6789997F830",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE19287-8C71-4161-94C5-B31A2CA907FD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E868B563-75A7-4E94-875F-BC0EA7AA228A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E0A4463-96F7-4516-B91C-DFAFA98358D5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB59C47E-47B5-41C4-A142-E818589D86A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4512943B-7794-454B-A0AD-D1F7C23D00BB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A4EC730-8E50-4274-99F8-B6A57C843546",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89865346-0EC6-4C1C-92CC-231ECE6AF73F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70AAD95-7460-49EE-BA18-4A9826658CDA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "900ECAD1-0290-490E-BB94-82667C13B829",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0760F2E1-5A01-40FC-9A2A-05C769D05986",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20419867-19A3-41D0-AD4E-866B47035EF6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97D572B8-0F2C-48A9-B397-DA1FE92844B7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9941B2B-CE46-4669-947D-2BA09DEF6B1A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE77E05B-54E7-4691-AF93-ADC24AE07D9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34DA5C31-71E8-4CEF-AEFD-0BD468E98870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "118522B5-3E87-4D27-9FC3-13F3AE4651BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6C02BD4-E46B-467A-8441-633933EE57E8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A270BEB2-4073-457B-9E7A-041F25B00A70",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4494A410-658A-4DC7-85C6-3792D4A4636D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6928685-947A-444F-B242-55B30F2BD495",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0170DE0A-DF4E-4881-9C66-9BF005897F12",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F713C93B-03CC-4688-8590-81C84C52D10F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F194921-25DA-40AD-AC77-A5C886E653DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD09D5B3-575A-4941-99DF-C1CCB324EF0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "894292B4-B683-4AE1-ACA0-07E14A7CAB04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78B312D0-771C-4C55-92E7-E19A82201B94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E8466D0-3102-4301-8F34-69FDF5E2F760",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76DB8A91-69F2-4028-AC04-B0FFCCFDD882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C85379BD-1976-43A2-87D0-B690B4A9440F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "369BF713-2229-493B-902C-D23F3DFE504A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DB699E7-4212-46C0-BBA0-A3A08AD6C225",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "072786FB-D929-48A9-BBB7-7EC3899DC9A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA041A0-8103-4742-BA97-FD28DD2EDEE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86C5F146-C7FD-4479-8E11-7443DCEA38ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBCB7188-8D72-4619-9779-73B6586A18E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92B48FFA-7FFE-44AB-9528-0681F631C1FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D402D3D7-319F-45D7-A5A2-8D1972D92F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D75118-242F-454C-97B6-9C50330E82BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F905D6-74DD-4547-82CF-AB43E3DD5AA7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D84124C1-41B9-4963-9E2E-F84E356D2EC1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60D56403-47C2-4321-BEB9-E08D392AE2CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A522350E-2FCE-4DFA-A660-7FA0CD1462C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED821805-43F4-4594-8B34-9369A4A51919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E59CD1D-24F8-40DD-BC34-1798B9BFD142",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B55966-2BE6-43B7-B3B1-5AC2E476029D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F80FE467-6745-462E-9602-D99EEFE4496F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5D0B584-4C98-4C58-B098-153A07FA7B7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77D33D60-DE04-4189-A8E6-B453F566970A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "122BD789-E195-48C4-8043-E7C911809AF6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52653418-2D8C-464A-806A-0E5BB7C70C58",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE33B2CC-C64B-4983-928A-BE8332458922",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63602AEB-A984-4556-B7B4-906BF0B1C4CB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69CACC60-EF0C-417B-8927-CBFDB90DE31D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D434C2FA-C27E-477F-A82E-4DB6B29F3162",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7FA773-033A-4502-A675-25AA640A9C61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CD3456D-04D8-4269-9971-D9245185FB63",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "801BA881-11C2-4042-87A1-6FDC643F2F39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7710F47C-C723-4F97-8A17-1BA8F1005255",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "93B6459E-CE0C-4344-8D63-C0116AB32796",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B69866D-4F3C-42B3-9B20-62137551CE9C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B346C94B-7A59-47A1-B2F6-A888968B7FE3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F09095A-1795-4FDB-A1B5-5FC584E1191F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88504A31-F003-4344-BD7E-A1D5F0970FB8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D61D6C5-4FB2-410D-A74D-1792054C6C04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5650BA0D-6066-42A2-8062-3FF81009E10B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77F596F0-6418-4D20-86C5-B48B027EC265",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F40FF26-207F-41C7-8E82-7AD6681AE0DD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59E33941-7E24-4FC8-941C-CC62B6B58822",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69369624-8D90-4A2A-8B85-8884AC5CBD28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A851E8E1-B1F0-4083-AFA8-3F59779F0206",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD61F9CE-68E5-481C-9711-B40343FF90CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56E41F36-3579-4AE4-8E7E-20D81962EA79",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233065C5-57E6-40E5-8A52-AE6D6F7196AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A571EB0-25AB-4450-8847-042749CE5F7D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8030ED2-0286-420A-B514-AC986C2700BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E56764-2A59-4B73-89A1-9D391FE33D5A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0520B4BF-4363-4747-86A9-5D481927CF4C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94719387-576F-4949-AA4D-6C8453085EBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA24153A-AE9B-4F76-9DFF-E00AB46744BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53223DBA-DAA1-4942-92D1-68B7647D07AD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E633481-0AD2-4291-8653-FEB3DA5DA279",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "272713A3-B88D-405B-AF30-FC6E90F2E3DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCE784AA-CC5A-4995-92AC-28073BABD832",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8260D7C-031B-489F-A7B9-1DEFC846BCD5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4A56C38-B2C6-4F19-806A-9346190BD7AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1536F2E-3181-4897-8ABD-AB2B939DF992",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD78127D-4BCD-4733-ABC1-D8558BE07C3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1419951-3645-4CBF-8EE0-209DC1727E92",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E78CF821-AFD7-4E76-BB94-A45495ABEC37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "060358B9-3630-421B-9366-F726D19C15D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8678C89-35A9-4256-AF4A-CC3A11BDB540",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1579A407-454F-4838-8850-8D4057507C8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A138826-DC79-4620-9142-2B7030DFCEAA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F050E14C-429C-421D-A01C-CC8E1DB40769",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "087C89AA-9876-4754-B2B1-CAE4F86D1375",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F62BFA52-B89C-410E-9FC6-B6F39825515A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B49B4BB-6D24-43A1-81DF-E786DFA600F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "271701A1-CFD4-4781-9F81-3255D90F8EE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6681601-99E9-492B-86BF-9C3BE23D1E9C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA8A2D55-C766-4E90-BB0E-2D912F17C768",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A15E9E54-0414-4C67-9DCD-181FCF2EE838",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6127C45-E91E-46B7-A806-FC0068575DB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4",
                     versionEndExcluding: "18.01.06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ADAD919-32C1-49D2-A419-C9A803DB6250",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E79A718-EEED-4C35-8B3A-8BDEFBC55282",
                     versionEndExcluding: "22.01.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "506DEE00-30D2-4E29-9645-757EB8778C0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4",
                     versionEndExcluding: "21.01.07",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "631AF2A2-F925-45CB-82DE-39053016F5B3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "754A6744-5194-4A99-BD3B-944A8707C80F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2",
                     versionEndExcluding: "21.01.07",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF9D4C3-1892-48FA-95B4-835B636A4005",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "42E364B9-1FC7-418A-860D-DD0E73DD930E",
                     versionEndExcluding: "7.1.91.3272",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DCF5972-C72D-4DE9-8B73-3C497D54596B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD389CE-AA26-445D-8D2B-27D3D06C3B68",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DD4A97-1648-4C7F-A5A0-6899BD13A617",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1A57A9-F6E5-4672-BD22-09EF5522CA10",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "042B60E7-0614-4EB3-8B47-07DEE5B5E274",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AD120-3465-4C00-AAB3-B6F6ED708B51",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E752006C-6D94-4B14-B3A5-C9BB94141BDB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "057D9947-CE4A-4B4C-B721-4B29FB71350C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C5DA136-7541-44E4-B8DF-065CEE065A99",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FFD2D72-5464-4B86-BACB-61F55A081C3A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C37BC27-C5B9-4740-BDFE-9439FB248CE6",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D87239-40C1-4038-B734-D77AC4DDD571",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5C3B3FD-7CF7-4172-87EC-11C129D5508A",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "687E1212-EC5A-47BA-ACAB-74F6C98B7C34",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EAE137-9336-43D6-AF8A-9161F236BD14",
                     versionEndExcluding: "9.1.41.3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8F37D88-E086-4060-8420-BD0F8D8FF580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2F29FED-7876-4801-B0B1-BC06A30B1310",
                     versionEndExcluding: "23.01.03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "187C6D51-5B86-484D-AE0F-26D1C9465580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AD2CE43-B3B3-480B-A607-BB5817B43256",
                     versionEndExcluding: "17.02.06.83.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A49883F4-8360-4895-8E9E-B274A35BDE57",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF57DC28-0EF6-4610-8B3C-587B79740D25",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E921D034-33C4-4526-8F94-98D580922409",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "578D9CB9-6831-41C5-99C3-E1940562F118",
                     versionEndExcluding: "6.2.61.3535",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.",
      },
      {
         lang: "es",
         value: "Múltiples desbordamientos de búfer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permiten que un atacante con acceso local al sistema ejecute código arbitrario con el privilegio de ejecución AMT.",
      },
   ],
   id: "CVE-2017-5711",
   lastModified: "2024-11-21T03:28:16.290",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-11-21T14:29:00.510",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/101918",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1039852",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/101918",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1039852",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.asus.com/News/wzeltG5CjYaIwGJ0",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Summary
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27",
                     versionEndExcluding: "11.8.93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8",
                     versionEndExcluding: "11.12.93",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA",
                     versionEndExcluding: "11.22.93",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564",
                     versionEndExcluding: "12.0.92",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5",
                     versionEndExcluding: "14.1.67",
                     versionStartIncluding: "14.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6",
                     versionEndExcluding: "15.0.42",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5",
                     versionEndExcluding: "16.1.25",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.",
      },
      {
         lang: "es",
         value: "Una desreferencia de puntero nulo en el firmware para Intel(R) AMT anterior a la versión 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario no autenticado habilite potencialmente la Denegación de Servicio (DoS) a través del acceso a la red.",
      },
   ],
   id: "CVE-2022-27497",
   lastModified: "2025-02-05T21:15:16.263",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4,
            source: "secure@intel.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-11T16:15:13.443",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-05-02 14:59
Modified
2025-02-07 14:15
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
secure@intel.comhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatch, Third Party Advisory
secure@intel.comhttp://www.securityfocus.com/bid/98269Third Party Advisory, VDB Entry
secure@intel.comhttp://www.securitytracker.com/id/1038385Third Party Advisory, VDB Entry
secure@intel.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdfThird Party Advisory
secure@intel.comhttps://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdfBroken Link
secure@intel.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_usThird Party Advisory
secure@intel.comhttps://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-frPatch, Vendor Advisory
secure@intel.comhttps://security.netapp.com/advisory/ntap-20170509-0001/Third Party Advisory
secure@intel.comhttps://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdfExploit, Technical Description, Third Party Advisory
secure@intel.comhttps://www.embedi.com/news/mythbusters-cve-2017-5689Third Party Advisory
secure@intel.comhttps://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerabilityTechnical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/98269Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038385Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdfBroken Link
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-frPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20170509-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdfExploit, Technical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.embedi.com/news/mythbusters-cve-2017-5689Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerabilityTechnical Description, Third Party Advisory



{
   cisaActionDue: "2022-07-28",
   cisaExploitAdd: "2022-01-28",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4D2787-FA10-4B06-BC00-B869FB16A424",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11D072B-B549-4352-B0E5-2E7C1923161E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EED42746-4191-4188-8BAD-4A23B4D6B242",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "52652BE3-F695-42FB-A6FF-4A51DBA6789B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD06FA87-E538-4492-9031-068CA05E63CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFFABA0B-46E6-4F2B-BA13-A48BF2587F68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4290CDD9-8D27-46AD-BEFC-36827FA4A348",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "09936A93-41E2-4293-B88B-4B7ED4E6FD44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8855E63-AE6C-44A7-A2FE-7E4791C69BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E92AF85-322D-4587-B393-62172EA51D62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF833CF3-0170-491D-AEDB-33003B35B47B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C27CD90-E986-4A89-B63E-1E3D2C62FBB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B71755C-4B29-4947-A436-1658097CD3F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "86388428-3285-4BC8-B0F2-2049B07711F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).",
      },
      {
         lang: "es",
         value: "Un atacante de red sin privilegios podría alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podría aprovisionar características de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT).",
      },
   ],
   id: "CVE-2017-5689",
   lastModified: "2025-02-07T14:15:42.800",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2017-05-02T14:59:00.520",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/98269",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1038385",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Broken Link",
         ],
         url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20170509-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.embedi.com/news/mythbusters-cve-2017-5689",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/98269",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1038385",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20170509-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.embedi.com/news/mythbusters-cve-2017-5689",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-269",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema para Intel® AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso adyacente",
      },
   ],
   id: "CVE-2020-8749",
   lastModified: "2024-11-21T05:39:22.543",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:17.533",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "778024BA-DC91-40C9-98F7-17C00F2AEB15",
                     versionEndExcluding: "11.8.70",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B",
                     versionEndExcluding: "11.11.70",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AC61CA-060D-4838-A017-50E307132A43",
                     versionEndExcluding: "11.22.70",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBA228C-D870-489F-A542-056153CF4853",
                     versionEndExcluding: "12.0.45",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el subsistema para Intel® AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente.",
      },
   ],
   id: "CVE-2019-11088",
   lastModified: "2024-11-21T04:20:30.900",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:12.160",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada inapropiada en Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario autenticado habilitar potencialmente una divulgación de información por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0531",
   lastModified: "2024-11-21T04:53:41.047",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:10.113",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B273234-6A62-430D-AF97-DAE65C7B16EB",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20684D0C-F699-4315-BB60-AAFA5E12D08A",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68AA7FEC-EDAB-408D-B9E3-5DECD205186E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C01525A-E5F1-4F2A-B561-11874BAB7EA1",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85F881D8-37D0-4391-8F95-71A70A4843B0",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.",
      },
      {
         lang: "es",
         value: "Una escritura fuera de límites en el subsistema IPv6 para Intel® AMT, Intel® ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-8752",
   lastModified: "2024-11-21T05:39:22.827",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:17.753",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2025-02-05 21:15
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA64798E-8B8B-4C7E-9858-F753C4E3EC27",
                     versionEndExcluding: "11.8.93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8",
                     versionEndExcluding: "11.12.93",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA",
                     versionEndExcluding: "11.22.93",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E5F9366-71AC-4F8D-9500-52A963229564",
                     versionEndExcluding: "12.0.92",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "490C0C69-3A37-408D-B779-61EA5A2BBBC5",
                     versionEndExcluding: "14.1.67",
                     versionStartIncluding: "14.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FAE052-A535-4BC9-8298-8C5C47650BE6",
                     versionEndExcluding: "15.0.42",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B456C3-213F-4396-A168-1D039DA661A5",
                     versionEndExcluding: "16.1.25",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
      },
      {
         lang: "es",
         value: "La autenticación incorrecta en el firmware de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a través del acceso a la red.",
      },
   ],
   id: "CVE-2022-26845",
   lastModified: "2025-02-05T21:15:15.827",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.8,
            source: "secure@intel.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-11T16:15:13.177",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada inapropiada en Intel® AMT versiones anteriores a 11.8.76, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgación  de información por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0535",
   lastModified: "2024-11-21T04:53:41.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:10.707",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Summary
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5900416C-C69C-4EBC-8071-26170807E958",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFA92E9-5534-47CB-8090-0529CC5F459E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF61D17-BFFB-4E6C-B47C-8770D99E6317",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08415E93-8652-45C3-9AC0-5BE19C39E7E9",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B273234-6A62-430D-AF97-DAE65C7B16EB",
                     versionEndExcluding: "11.8.80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20684D0C-F699-4315-BB60-AAFA5E12D08A",
                     versionEndExcluding: "11.12.80",
                     versionStartIncluding: "11.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68AA7FEC-EDAB-408D-B9E3-5DECD205186E",
                     versionEndExcluding: "11.22.80",
                     versionStartIncluding: "11.22.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C01525A-E5F1-4F2A-B561-11874BAB7EA1",
                     versionEndExcluding: "12.0.70",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85F881D8-37D0-4391-8F95-71A70A4843B0",
                     versionEndExcluding: "14.0.45",
                     versionStartIncluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el subsistema para Intel® AMT, Intel® ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, pueden habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información  por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-8754",
   lastModified: "2024-11-21T05:39:23.017",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-12T18:15:17.907",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20201113-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Summary
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6011F809-FD13-458A-9DBF-89499A3D60D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1F7C3F-7685-45F0-B4E6-C2CE4248B5B4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "166B009B-E62A-4377-A624-CB90E2909571",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F0A534-7CC5-477F-AC5A-5F3C16481884",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "141446CB-9BBF-451B-A8F9-67A4A301579B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F3AFD4-764C-4D33-924E-62B322D56450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC86AE37-F425-4CD7-B061-2B784BC6778D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "166B009B-E62A-4377-A624-CB90E2909571",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92DD6C9E-E0AA-4A52-A4F6-3B4355CCB916",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA712BE4-ADA2-4907-B813-D21C6E89629F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F33E597F-1CD3-462F-9F0F-EA5D98D0A903",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F727FF41-F05C-42D5-B39C-9C97D90DE9FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D460DFD-0726-45B8-BF00-3F5AEE9B3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE338FD-FCA9-4725-AAE7-E12FA7B197B4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20D3A26C-22CF-43C5-90D1-E4B4AEDCB629",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92DD6C9E-E0AA-4A52-A4F6-3B4355CCB916",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA712BE4-ADA2-4907-B813-D21C6E89629F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F33E597F-1CD3-462F-9F0F-EA5D98D0A903",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F727FF41-F05C-42D5-B39C-9C97D90DE9FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D460DFD-0726-45B8-BF00-3F5AEE9B3024",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE338FD-FCA9-4725-AAE7-E12FA7B197B4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D2333DD-4F31-4056-B0C4-C5C13FCB563D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1622BAB2-9B31-417B-A89D-89A3E9E95DA0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "620E5F09-EEA6-4093-82E2-7A28C7E7DD9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6154064-485F-47F7-BB1A-5AD773C7E98D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "35A485AB-75ED-4E42-A24C-2F19DF98CF5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15745BD1-2362-4747-8C45-21AF5309BE3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F55A6BA-2963-4EA1-BB5F-07C990D80D5B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "18E0621E-A491-4345-BD3F-14CC2C806706",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1868F499-00F3-4393-890B-6C8BE3E4A8AB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F16E7E98-9047-44A4-8C19-69FF07699333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F16E7E98-9047-44A4-8C19-69FF07699333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C27BBB6-B4B7-43E4-8F42-42097C3BFE3D",
                     versionEndIncluding: "11.8.50.3420",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad de reproducción de tramas en el subsistema Wi-Fi en productos Intel Dual-Band y Tri-Band Wireless-AC permite que un atacante remoto reproduzca tramas mediante un ataque Man-in-the-Middle (MitM) basado en canales.",
      },
   ],
   id: "CVE-2017-5729",
   lastModified: "2024-11-21T03:28:18.313",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-11-21T14:29:00.620",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD1D393-58BA-4F53-835F-C7B13F44BBC6",
                     versionEndExcluding: "11.8.77",
                     versionStartIncluding: "11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1171B682-C648-451B-97D2-4AADA9638BB9",
                     versionEndExcluding: "11.12.77",
                     versionStartIncluding: "11.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF0384F-DBAC-49FD-9E31-453AF6A13A68",
                     versionEndExcluding: "11.22.77",
                     versionStartIncluding: "11.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D0505-C8E2-4F3E-9186-6923C7D01A55",
                     versionEndExcluding: "12.0.64",
                     versionStartIncluding: "12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada inapropiada en el subsistema para Intel® AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario privilegiado habilitar potencialmente una denegación de servicio por medio de un acceso de red",
      },
   ],
   id: "CVE-2020-0537",
   lastModified: "2024-11-21T04:53:41.717",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-15T14:15:10.847",
   references: [
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "secure@intel.com",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200611-0007/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.lenovo.com/de/en/product_security/len-30041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}