Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-0152 (GCVE-0-2019-0152)
Vulnerability from cvelistv5
- Escalation of Privilege
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | 2019.2 IPU – Intel(R) Processor Security |
Version: See provided reference |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:44:14.767Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "2019.2 IPU \u2013 Intel(R) Processor Security",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-11T11:06:03",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0152",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 Intel(R) Processor Security",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"name": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2019-0152",
"datePublished": "2019-11-14T19:06:54",
"dateReserved": "2018-11-13T00:00:00",
"dateUpdated": "2024-08-04T17:44:14.767Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-0152\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-11-14T20:15:11.493\",\"lastModified\":\"2024-11-21T04:16:21.067\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Una protecci\u00f3n insuficiente de la memoria en el modo System Management (SMM) e Intel\u00ae TXT para ciertos procesadores Intel\u00ae Xeon\u00ae, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823AD74E-785B-40C9-BA27-F988F5006263\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6DA7A-7C97-40E1-B31A-B92BB658C429\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433CEBA3-2B72-404D-B561-957CEAC0A5B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF128B-9984-4C91-B7F6-968DE376C3BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D076A4C-EBFF-47CD-898C-E3D8595897DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B167F1-63FA-4C86-84AB-836ABF84E6E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35F1845-F913-43E2-AA05-F64FD0A6A736\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185E8FBC-9EE9-472E-867B-0B0DEEECA13E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D9A1F6-A5BF-4456-9908-A767CF2FF866\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11562A6B-26CD-40A6-9184-7CA128E1F017\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3C00A0-C28A-46EB-853D-DAE3819399D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3829529-3EC5-4681-8902-AA581D9C2DDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CAB607-87B2-49F4-9FAB-662D5EA3D11C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F2F3C4-28A2-4C3B-9136-B222797FCB0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955420F9-3A3F-40E0-9940-DD43C5C78D62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2C6506-97AA-4E82-9678-E98C58D3F4CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C950976-266D-4258-86CB-8987C093331F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B8978A-6621-41F4-AEAC-27B3FC5029B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3219701A-8CF0-4307-A957-1E31F6A5C195\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7F4E55-3AA3-40EC-8686-719F8474B3B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BA9357-FDCE-4FE2-ACC1-065E6C0C6994\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4A437C-6C00-4729-91CC-D27EB3542633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5D6779-B826-418F-812B-D1AD926E2D7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74ED727D-B1A9-4F4B-92C7-3F00F3A80013\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C24951-B3FA-48E6-AFAC-6CA0D2348230\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EDEBFCA-2B4B-4C56-80BF-E14704149F9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713D5096-EF81-4B61-963D-63B56C03AE68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BEA9978-20AA-4224-A22C-5F0D392A6E1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89A5F91-2F18-49FA-82B4-0437414751F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFDF125-D5BD-40A6-8958-68C8F93C913F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8D8C4-29EA-4D09-87AB-A570403BA0E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D43F33-6733-49BE-87B2-14936230E5C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89421EC5-52E5-441F-AD3B-5C5E964F836D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80DDA8F-A66E-4E20-BA6F-BEDA18CFE711\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9236F094-B913-43F2-B703-CE33B9CEBA0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39A299B1-2DB1-4388-8369-6C70BDCC5D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0986CB70-7825-4AF9-9358-9698D7F40492\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345FF353-FE25-41F4-97EC-FF32BE2796EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE3CED4-BD1B-4B3D-817D-F49F19822EB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA2030D-CEAF-46BF-9669-19EAD541BDB6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C818E-B5FB-414C-94C8-E8372A55F610\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A9AD79-9B4B-4EE8-810B-359901C3540C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4B7AD9-452D-4C53-8785-6B06E3009894\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86CCC45-270E-4760-A7E9-D39C74C00FCF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3A6E6D-FC3F-4218-918C-4571EBD6513D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C105930C-D2BB-4FA1-B5D1-882D90D867C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82A4157F-D890-4FC7-8415-A41C0CDEE8C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45227E88-ACFF-43A5-AF45-C6542A6EF681\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E39C9D8-2CD3-4536-8ED0-866D4C7A20F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5168E40-DF2F-4E39-8B5E-9659EBBB99A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04304600-5379-4B6F-9FCC-B77AFFB17B91\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BF77DA-E159-4336-A552-B22BE437670D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E97DDE9-A40D-4A94-9789-56B481F81C6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD440FF2-14BA-40D3-A05B-09211729CD3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1612AE8A-3165-47A3-AEA8-65F4156C48BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23AF1DF3-4044-47E7-9904-19CE0C9C5F2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EA99F9-22C2-47ED-9DDD-928E19C4C51E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B0B7EA-DBC1-4E02-A33E-7180FAB684F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF72F37A-2F28-40E6-A84B-0E1DF63B1812\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D07C007-095A-4C11-A663-E38D624690D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8867B2-F297-4D30-AD43-77B0F67FAE3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215608D2-0F48-4E32-963A-2DFE74A84557\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB72D13B-5880-4CB2-8E80-CB6A39B5A302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F7F6B-847A-479D-B6B1-BBA331D06DE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0E2164-CFCA-4236-A6AD-74484E387639\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED0D492-ADAB-41ED-A283-024D3CED441F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AEC407A-5450-468F-B0CB-3028FF92468F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC498-F558-4C2F-9E14-7897060CA9FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B880E026-665A-4519-87D4-4DCA08977033\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E21977E-7085-46C5-8E89-F952C2EBCE04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EEECD1-018A-47FB-8CDA-6786864994B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"761A4FF6-04FA-4DF4-AD51-58DA0211BA1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAE2B11-B0F5-415F-BD6B-E285EF9C9095\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"262ED175-6056-4FD6-840C-F4523A96677D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8292CC-DACB-489A-BCB2-73DC2C6F944C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C76503-5F56-4C2B-8973-A3F94B1345DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A6461C-C6F0-4A65-A86E-4420B1ACE6DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA49CF7-C6BE-4337-A0A8-A603D8955EE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D544957-C9D8-4AC1-A7DE-7E6FE000E2E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"352D121E-69C0-470E-AE02-8413DCBE1DC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F42D02F2-46A7-4359-94BC-7AE15EDE692D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19FF1B1-F380-4CE7-8C09-DEFF7ED86571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A7D63-4638-480C-94CB-ED06613BA75C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7AF2819-C873-41A9-94F5-B8B34EBC9633\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E2764D-7D6A-4CE0-A628-FFE966A6462F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D162F8D-5836-4B52-A98B-EFB0289C1346\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6ACF161-472E-4088-85C2-5940C9C88D45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C5FB6D-C652-4743-84F0-D7BB55F2733F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B4C84-1258-4F2F-B8A3-55353B3D13BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685FCDB3-F3FF-49C0-A26D-BFC081F2B78D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C375A9D-C7CE-49A6-B08D-9CAB22E16D32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E317001-0126-4B64-85AE-04AEC9954085\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BCB7D2-4B68-4FF8-BFC9-06C39A708C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B51741B-1976-4998-B5DC-5AE1D62F6864\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3E45C-1943-42BA-9F6D-EA64D67BF954\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3943BF-B43A-4077-B75D-EBE27C3D6A17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E231B13-FC1B-41E3-A47D-4F0FC4F37B33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"728C0EE8-D4D9-4426-9709-46505AF901D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067C65E5-5392-4DAF-A6BD-640D78C19CE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54686C14-25E6-4B4B-8ABA-FB115F6DDC3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938EF635-E09B-448B-A446-48890A209878\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178345A5-9A38-4C8F-B3BB-430276FA4998\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA58EFB-7672-4902-ABC1-65217AA617AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641570F3-6C32-40C6-8486-626FD4899B8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADE3148E-2DCE-4CA9-ABE3-43779D06DD42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC462EF-264D-4365-A965-0BCE9C687496\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5AB911F-8825-4C97-9454-4F5DC5396E2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070C20AB-66F2-4EE2-8134-5E40DBB9B9E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2411CF40-9A5F-4138-9111-84087A30050F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B8CDF0-1489-4E4C-B004-A22E06FC10D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8141C47E-4F0B-498E-8B18-264E90448C3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1647DAC-CED6-4DAF-8F82-A42D6D691DF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB40F57-7944-48CE-AFC6-9531D1E6B71C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6456D0-32AE-44A9-9F63-AD64B5E49182\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA876028-4021-4B58-94C2-89CEBD9CBA23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B704835-1250-44E1-923C-5DE2F4DD25D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB7EA5C-D048-4130-83D9-497A1769C851\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A923F6-E352-4752-B7D3-007FE1CAFE06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4226119-3BCB-4523-BD2E-21BC9C4F2217\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E290F38C-7A86-469D-9E6A-F0EC69DBE23A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7682FD90-727B-4190-B053-29E29660E397\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E207648-E57F-4C43-8FDD-049BF9214664\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0D73FF-6831-4332-B720-DADD9A53C22D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFB4646-A5BA-4662-A47F-62407AFEDFF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07BB4987-AB65-4054-8528-3C32DEF61540\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3AF74E-C719-4E55-959D-681174FFFB90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FD9772-975A-48D1-83DF-713F60B5F501\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF30717-CBEF-42F9-AE0D-4F6A1877EA55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7137FDAC-D47E-4AB6-B7AE-3EA90AFED052\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D0351-303B-4ABF-A7FD-734176095307\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596D1638-076D-4A57-AB79-22278085CBCD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25934425-944F-4B9A-8A16-F1DCBF3D5032\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DD21434-492F-4657-BEAC-9377ECE62B0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22243DEF-F01B-4774-AEC1-40D776E1167E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89565573-AEFF-48C3-BC84-C377C32D4714\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087D09E-ADCB-478A-87FD-B7113FD29EFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7C0152-876E-4380-A0CA-B0FE79A3EB63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04EC7421-963C-43F7-9450-2E204BAFF1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32DCC33-F4C0-449F-9CBB-F9F9895DA684\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D609DB7E-AE80-48E0-B7B6-E622B6208ABF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2FCC5DE-7BFB-4DF9-BB3E-C86AD99360EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D64D1ED-A386-4475-99AB-7727DE67E1A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3F4C12-F26B-4BF5-9A4E-125ACC1F9A6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE862F15-69CC-488E-ABE8-1E23A5A1089F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A659499-6C74-49B6-8EFA-AA93E818BC4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B080431-626C-4A7B-AB37-47EE6811A5A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17073B15-57FF-4B06-ACB5-8E51715D20D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E921DEBA-3063-4639-9823-2FDDD8DEA793\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D633D7-4CE8-4378-AA86-2FC518705725\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCC81D7-E2EA-439C-9844-3C35C83549FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD67CFA-4E44-45FF-ADCA-DE178FA8D8CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"383DCE68-3882-4274-AA4A-5E030530E4BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D4DA774-A3D3-4171-B733-42DB8E5D47EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A3CABE-9C4E-4EE5-A2FC-5CDA47893D5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5983B72F-9194-47CB-B444-2ECC6360B686\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80C54E18-D1A2-4651-9F52-F7846121D4F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4E44C3-D29F-4057-AE12-BA19FFFF69E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2C89DC-2DD0-4F8F-B7F2-A102419D1D1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EF77397-85D0-4EC2-9887-2D0D9D253450\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2B805F-F692-4B71-942A-65BF2AF78FB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A5BC76B-A4FC-4702-A544-889E62F8509E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE58040F-EE13-4EB5-92B8-7A25595DEA62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90F0D1EF-2FE1-498A-AE38-BF755A680E88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDD3F0B-F99F-4D28-98FF-5051E8841638\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09C3656-AE49-4F26-BD28-B725E8C40304\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FA88FF-EE13-4B3B-BA06-EDDD5392DF5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EB131A-87DE-45FB-9025-B02EC28C4304\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2478D053-2E0A-4962-A38D-A05DA6A75D71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0E40BC-5745-4AB0-B991-61A0C63DB284\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189B8D49-563A-41FA-9849-C0C10678721F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"644C5C4C-4257-4B9F-BE0C-01271B7BE6BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEFB056-0872-434B-9630-28A1AAEAD470\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4784CBB2-276A-4742-92F6-0B5A35818B7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A62CB9-FB01-45CB-9E10-E72D87C0E1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE33A02E-5A74-4F9B-BEBE-657F311C0387\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B4F7FE-61A3-417A-BAA9-E686A76F3A94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0E4832-F8E5-4718-9358-C2E12049B771\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7305838B-84CA-4BB8-A350-B2D2844F1041\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD96F46-FB80-4E43-802B-2918F8650E3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D356D196-8AB0-4387-A644-C5E68174A60C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4E951A-EFE0-4976-BB67-B3996594C8D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA909754-B60A-4B30-AF42-4C8734E155AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEABF4C-68FE-4F14-B19B-0021312264E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3B2FF7-F02F-4FE5-8585-1B242D06CF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524AFD4-2D9F-4A4B-82F4-13BCDE99041E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F946544A-D4CC-4758-8B26-4FC2AD944F01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8EED1D9-75CC-41E9-9C0C-C648E0717024\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A24929-1F33-4AFE-B80B-8F9DCFA141B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB677676-E793-4158-BF53-3F5ECCECE203\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8A78D4-3FAC-42C0-8E10-7D4793AEF338\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3413CB-86D3-4684-B651-DBACC0660E76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B774A43F-3EF6-46EE-9909-51A273471FFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2117880B-FDD4-4A90-B29B-6D840D26645D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B66C7A1-46DC-417F-A1F0-05CFF95E8C83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB43A67-9DD7-49E6-BA77-220120C90700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F371BC-529E-4787-ABE6-BE7BD937B04F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687CADE-6E49-4284-BD41-6CA2FDD846FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD77A673-DD3B-431A-ABA6-F00E220819B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E477BD27-BD2C-43BB-9637-2A866575637A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"122BD094-E815-4081-B674-B71AC193BE0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE8D02A-E569-499C-8EEB-273FE003364E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D86199-5CF3-4E7A-8295-50F958EA4B4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3757F7B-4283-4ABF-974B-59E4E2358035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93409D2B-67E1-4410-9013-28E80B2525C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4925D0EA-D524-432F-8417-892BB8C3DDFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505E8798-0795-48A9-A55F-88CFF761843D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61643FC4-4D2C-42A8-ADDB-1866A6F638DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E00698-8A08-433F-8852-8EDC422A53D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0327393-DB2A-455B-8E20-3EDB3766CDA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35DE5D2A-7DCF-4398-8514-9BB88DC81B77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCADFB25-DCBB-4901-9E4D-132ED49C7F26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440D381D-D093-474C-8D22-AD610DEAB775\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAAD0F0-9182-46EF-8399-C04FB472BE6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A06D956-804A-47DE-85D2-26BEE9B3E313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B10FCF1-F496-4166-9162-41012C4D2B16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3930A6D-64DC-4953-AD7E-EED0C48B048E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D4C607-D5EA-43C3-AE74-301BF0BA929F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA657873-A9B1-4513-8C60-29FAEC1E22F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B804174C-53DB-4641-BD26-3ECDD9FBD638\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639D3795-0A1B-4CC7-BD9F-B75118B4A45F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50CC669-9555-45E9-A43B-05A21FB040E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"965674C3-2816-498F-A2B8-E02847BB6CEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63293B85-A014-4F23-97EE-6CE3467FCB06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D364DCDC-2A19-402A-8285-57E5E216374B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B85362-44E5-4107-AC8A-29DEE2A7EEDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B137CE46-56D3-484B-AD4B-E57C903DDEFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1C36BE-D4DC-4965-8106-EDA77BDB64DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BAC9F6-35CE-4045-9F28-EE5A66C70282\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"739731E7-F1BF-4D12-B103-E7F85B35307E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D231E6E8-6848-4914-B79F-FD44962FED2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F91FC3-CF90-450D-9E71-4A301A997921\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF3665E-34AC-43A5-BC48-3365880097D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A62225-DD72-4BDD-9BEA-0DE3577D6743\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFC055D-B249-4EB4-8A9F-BE4391A27505\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CCF73F8-7B2E-4B92-AEE4-F59ED8CDD187\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7061E-E26C-4905-AB41-18267DD32821\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf\",\"source\":\"secure@intel.com\"},{\"url\":\"https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secure@intel.com\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
WID-SEC-W-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
wid-sec-w-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
CERTFR-2019-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les microgiciels Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel PTT versions antérieures à 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-X_x antérieures à SPS_SoC-X_04.00.04.086.0 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x antérieures à 11.22.70 | ||
| Intel | N/A | Les processeurs Intel, voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x antérieures à 13.0.10 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x antérieures à 12.0.45 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions antérieures à 11.8.70 | ||
| Intel | N/A | Intel SPS versions SPS_E5_x antérieures à SPS_E5_04.00.04.381.0 | ||
| Intel | N/A | Intel SPS versions SPS_E3_x antérieures à SPS_E3_04.01.04.054.0 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-A_x antérieures à SPS_SoC-A_04.00.04.181.0 | ||
| Intel | N/A | Le microgiciel des contrôleurs Ethernet Intel séries 700 versions antérieures à 7.0 | ||
| Intel | N/A | Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Le logiciel pour contrôleurs Ethernet Intel séries 700 versions antérieure à 24.0 | ||
| Intel | N/A | Intel TXE versions 3.0.x et 3.1.x antérieures à 3.1.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x antérieures à 11.11.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x antérieures à 14.0.10 | ||
| Intel | N/A | Intel TXE versions 4.0.x antérieures à 4.0.20 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel PTT versions ant\u00e9rieures \u00e0 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-X_x ant\u00e9rieures \u00e0 SPS_SoC-X_04.00.04.086.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x ant\u00e9rieures \u00e0 11.22.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les processeurs Intel, voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x ant\u00e9rieures \u00e0 13.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x ant\u00e9rieures \u00e0 12.0.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions ant\u00e9rieures \u00e0 11.8.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E5_x ant\u00e9rieures \u00e0 SPS_E5_04.00.04.381.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E3_x ant\u00e9rieures \u00e0 SPS_E3_04.01.04.054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-A_x ant\u00e9rieures \u00e0 SPS_SoC-A_04.00.04.181.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le microgiciel des contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le logiciel pour contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieure \u00e0 24.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 3.0.x et 3.1.x ant\u00e9rieures \u00e0 3.1.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x ant\u00e9rieures \u00e0 11.11.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x ant\u00e9rieures \u00e0 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0143"
},
{
"name": "CVE-2019-11179",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11179"
},
{
"name": "CVE-2019-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
},
{
"name": "CVE-2019-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0150"
},
{
"name": "CVE-2019-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2019-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
},
{
"name": "CVE-2019-11170",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11170"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2019-11137",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11137"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2019-11175",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11175"
},
{
"name": "CVE-2019-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0139"
},
{
"name": "CVE-2019-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0140"
},
{
"name": "CVE-2019-11172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11172"
},
{
"name": "CVE-2019-11177",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11177"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2019-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0141"
},
{
"name": "CVE-2019-11136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11136"
},
{
"name": "CVE-2019-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0149"
},
{
"name": "CVE-2019-11181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11181"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2019-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0144"
},
{
"name": "CVE-2019-11173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11173"
},
{
"name": "CVE-2019-11182",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11182"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2019-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0124"
},
{
"name": "CVE-2019-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
},
{
"name": "CVE-2019-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11168"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2019-11171",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11171"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0142"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2019-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0146"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2019-11178",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11178"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2019-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
},
{
"name": "CVE-2019-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
},
{
"name": "CVE-2019-11180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11180"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0148"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2019-11174",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11174"
},
{
"name": "CVE-2019-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0145"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2019-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0147"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les microgiciels\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les microgiciels Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00313 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00219 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00270 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00210 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00240 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00255 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00271 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00260 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00280 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00164 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00241 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00220 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
}
]
}
CERTFR-2020-AVI-090
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC IPC427D, IPC427E (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC Route Control V8.1 | ||
| Siemens | N/A | SCALANCE M-800 / S615 versions antérieures à V6.1.2 | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V16 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. variante SIPLUS) | ||
| Siemens | N/A | OpenPCS 7 V9.0 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller versions antérieures à 20.8 | ||
| Siemens | N/A | SIMATIC ET200MP IM155-5 PN ST (incl. variante SIPLUS) versions antérieures à V4.1.0 | ||
| Siemens | N/A | SIMATIC ET200SP IM155-6 PN ST (incl. variante SIPLUS) versions antérieures à V4.1.0 | ||
| Siemens | N/A | SIMATIC Field PG M4, Field PG M5, Field PG M6 | ||
| Siemens | N/A | SIMATIC S7-400 PN/DP CPU V7 (incl. variante SIPLUS) | ||
| Siemens | N/A | SIPROTEC 4 et SIPROTEC Compact relays equipped with EN100 Ethernet communication modules | ||
| Siemens | N/A | SIMATIC Route Control V8.2 | ||
| Siemens | N/A | SIPORT MP versions antérieures à V3.1.4 | ||
| Siemens | N/A | SCALANCE X-200IRT switch (incl. variante SIPLUS NET) versions antérieures à V5.4.2 | ||
| Siemens | N/A | OZW672 versions antérieures à V10.00 | ||
| Siemens | N/A | SIMATIC CP 1626 | ||
| Siemens | N/A | SCALANCE X-200 switch (incl. variante SIPLUS NET) versions antérieures à V5.2.4 | ||
| Siemens | N/A | SIMATIC CP 1543-1 (incl. variante SIPLUS NET) versions antérieures V2.2 | ||
| Siemens | N/A | SIMATIC NET PC Software | ||
| Siemens | N/A | RUGGEDCOM RM1224 versions antérieures à V6.1.2 | ||
| Siemens | N/A | SIMATIC WinCC V7.3 | ||
| Siemens | N/A | SIMATIC PCS 7 V8.1 | ||
| Siemens | N/A | SCALANCE X-300 switch (incl. X408 et variante SIPLUS NET) versions antérieures à V4.1.3 | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 | ||
| Siemens | N/A | SCALANCE S602, S612, S623, S627-2M, S627-2M | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P versions antérieures à V4.6 | ||
| Siemens | N/A | SIMATIC BATCH V8.1 | ||
| Siemens | N/A | SIMATIC BATCH V9.0 | ||
| Siemens | N/A | SIMATIC RF182C | ||
| Siemens | N/A | SCALANCE XR-500 switch versions antérieures à V6.2.3 | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V13 versions antérieures à V13 SP2 | ||
| Siemens | N/A | SCALANCE W700 IEEE 802.11n versions antérieures à V6.4 | ||
| Siemens | N/A | SIMOTION P320-4S | ||
| Siemens | N/A | SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. variante SIPLUS NET) | ||
| Siemens | N/A | IE/PB LINK PN IO (incl. variante SIPLUS NET) | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 versions antérieures à V4.5 Patch 01 | ||
| Siemens | N/A | SIMATIC ET200SP IM155-6 PN HF (incl. variante SIPLUS) versions antérieures à V4.2.2 | ||
| Siemens | N/A | SIMATIC S7-300 PN/DP CPU (incl. les CPUS ET200 associées et variantes SIPLUS) | ||
| Siemens | N/A | SIMATIC RF180C | ||
| Siemens | N/A | SIMATIC CP 343-1 Advanced, CP 343-1, CP 343-1 LEAN, CP 443-1 Advanced, CP 443-1 (incl. variante SIPLUS NET) | ||
| Siemens | N/A | SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG versions antérieures à V4.1 | ||
| Siemens | N/A | SIMATIC PCS 7 V8.2 | ||
| Siemens | N/A | TIM 1531 IRC (incl. variante SIPLUS NET) versions antérieures à V2.0 | ||
| Siemens | N/A | SIMATIC CP 343-1 ERPC, CP 443-1 OPC UA | ||
| Siemens | N/A | SIMATIC MV400 | ||
| Siemens | N/A | OZW772 versions antérieures à V10.00 | ||
| Siemens | N/A | SIMATIC IPC Support, Package for VxWorks | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V15.1 | ||
| Siemens | N/A | SINAMICS DCP versions antérieures à V1.3 | ||
| Siemens | N/A | SIMATIC CP 1616 et CP 1604 versions antérieures à V2.8.1 | ||
| Siemens | N/A | SIMATIC ET200pro, IM 154-3 PN HF et ET200pro, IM 154-4 PN HF | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) V14.0.1 | ||
| Siemens | N/A | SIMATIC IPC127E, IPC427C, IPC477C, IPC477D, IPC477E, IPC477E Pro, IPC527G, IPC547E, IPC547G, IPC627C, IPC627D, IPC627E, IPC647C, IPC647D, IPC647E, IPC677C, IPC677D, IPC677E, IPC827C, IPC827D, IPC827E, IPC847C, IPC847D, IPC847E | ||
| Siemens | N/A | SIMATIC RF600 versions antérieures à V3.2.1 | ||
| Siemens | N/A | SIMATIC ET200AL IM 157-1 PN, ET200ecoPN (excepté 6ES7148-6JD00-0AB0 et 6ES7146-6FF00-0AB0), ET200M IM153-4 PN IO HF (incl. variante SIPLUS), ET200M IM153-4 PN IO ST (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC ET200MP IM155-5 PN HF (incl. variante SIPLUS) versions antérieures à V4.2.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU (incl. les CPUS ET200 associées et variantes SIPLUS) versions antérieures à 2.8 | ||
| Siemens | N/A | OpenPCS 7 V8.2 | ||
| Siemens | N/A | SIMATIC CP 1628 versions antérieures à V14.00.15.00_51.25.00.01 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 versions antérieures à 7.5.1 Upd1 | ||
| Siemens | N/A | SIMATIC CP 1623 versions antérieures à V14.00.15.00_51.25.00.01 | ||
| Siemens | N/A | SIMATIC ITP1000 | ||
| Siemens | N/A | SIMATIC Route Control V9.0 | ||
| Siemens | N/A | SIMATIC ET200S, ET200SP IM155-6 PN Basic (incl. variante SIPLUS) | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | ||
| Siemens | N/A | OpenPCS 7 V8.1 | ||
| Siemens | N/A | SIMATIC S7-400 PN/DP CPU V6 et antérieures (incl. variante SIPLUS) | ||
| Siemens | N/A | SIMATIC WinCC V7.4 | ||
| Siemens | N/A | SCALANCE XM-400 switch versions antérieures à V6.2.3 | ||
| Siemens | N/A | PROFINET Driver for Controller versions antérieures à V2.1 Patch 03 | ||
| Siemens | N/A | SIMOTION P320-4E | ||
| Siemens | N/A | SIMATIC BATCH V8.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC IPC427D, IPC427E (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M-800 / S615 versions ant\u00e9rieures \u00e0 V6.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1200 CPU (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OpenPCS 7 V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller versions ant\u00e9rieures \u00e0 20.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200MP IM155-5 PN ST (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200SP IM155-6 PN ST (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Field PG M4, Field PG M5, Field PG M6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 PN/DP CPU V7 (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 4 et SIPROTEC Compact relays equipped with EN100 Ethernet communication modules",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPORT MP versions ant\u00e9rieures \u00e0 V3.1.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT switch (incl. variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V5.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OZW672 versions ant\u00e9rieures \u00e0 V10.00",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1626",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200 switch (incl. variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V5.2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1543-1 (incl. variante SIPLUS NET) versions ant\u00e9rieures V2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 versions ant\u00e9rieures \u00e0 V6.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-300 switch (incl. X408 et variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V4.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S602, S612, S623, S627-2M, S627-2M",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P versions ant\u00e9rieures \u00e0 V4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF182C",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR-500 switch versions ant\u00e9rieures \u00e0 V6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V13 versions ant\u00e9rieures \u00e0 V13 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W700 IEEE 802.11n versions ant\u00e9rieures \u00e0 V6.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4S",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. variante SIPLUS NET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "IE/PB LINK PN IO (incl. variante SIPLUS NET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 versions ant\u00e9rieures \u00e0 V4.5 Patch 01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200SP IM155-6 PN HF (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 PN/DP CPU (incl. les CPUS ET200 associ\u00e9es et variantes SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF180C",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 343-1 Advanced, CP 343-1, CP 343-1 LEAN, CP 443-1 Advanced, CP 443-1 (incl. variante SIPLUS NET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB-200, XC-200, XP-200, XF-200BA and XR-300WG versions ant\u00e9rieures \u00e0 V4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (incl. variante SIPLUS NET) versions ant\u00e9rieures \u00e0 V2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 343-1 ERPC, CP 443-1 OPC UA",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV400",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OZW772 versions ant\u00e9rieures \u00e0 V10.00",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC Support, Package for VxWorks",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V15.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS DCP versions ant\u00e9rieures \u00e0 V1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1616 et CP 1604 versions ant\u00e9rieures \u00e0 V2.8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200pro, IM 154-3 PN HF et ET200pro, IM 154-4 PN HF",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC (TIA Portal) V14.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC127E, IPC427C, IPC477C, IPC477D, IPC477E, IPC477E Pro, IPC527G, IPC547E, IPC547G, IPC627C, IPC627D, IPC627E, IPC647C, IPC647D, IPC647E, IPC677C, IPC677D, IPC677E, IPC827C, IPC827D, IPC827E, IPC847C, IPC847D, IPC847E",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF600 versions ant\u00e9rieures \u00e0 V3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200AL IM 157-1 PN, ET200ecoPN (except\u00e9 6ES7148-6JD00-0AB0 et 6ES7146-6FF00-0AB0), ET200M IM153-4 PN IO HF (incl. variante SIPLUS), ET200M IM153-4 PN IO ST (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200MP IM155-5 PN HF (incl. variante SIPLUS) versions ant\u00e9rieures \u00e0 V4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU (incl. les CPUS ET200 associ\u00e9es et variantes SIPLUS) versions ant\u00e9rieures \u00e0 2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OpenPCS 7 V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1628 versions ant\u00e9rieures \u00e0 V14.00.15.00_51.25.00.01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 7.5.1 Upd1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CP 1623 versions ant\u00e9rieures \u00e0 V14.00.15.00_51.25.00.01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITP1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Route Control V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200S, ET200SP IM155-6 PN Basic (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "OpenPCS 7 V8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 PN/DP CPU V6 et ant\u00e9rieures (incl. variante SIPLUS)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM-400 switch versions ant\u00e9rieures \u00e0 V6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PROFINET Driver for Controller versions ant\u00e9rieures \u00e0 V2.1 Patch 03",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4E",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC BATCH V8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-19282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19282"
},
{
"name": "CVE-2019-19277",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19277"
},
{
"name": "CVE-2019-13926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13926"
},
{
"name": "CVE-2019-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-19281",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19281"
},
{
"name": "CVE-2019-13941",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13941"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2019-18217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18217"
},
{
"name": "CVE-2019-12815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12815"
},
{
"name": "CVE-2019-13940",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13940"
},
{
"name": "CVE-2019-19279",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19279"
},
{
"name": "CVE-2019-13925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13925"
},
{
"name": "CVE-2019-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-6585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6585"
},
{
"name": "CVE-2020-19282",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19282"
},
{
"name": "CVE-2019-13924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13924"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
}
],
"initial_release_date": "2020-02-13T00:00:00",
"last_revision_date": "2020-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-090",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-398519 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-940889 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-974843 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-974843.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-270778 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-270778.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-780073.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-986695 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-750824 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-750824.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-951513 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-951513.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-431678 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-431678.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-591405 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-591405.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978558 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978558.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 11 f\u00e9vrier 2020",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf"
}
]
}
fkie_cve-2019-0152
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf | ||
| secure@intel.com | https://support.f5.com/csp/article/K34425791?utm_source=f5support&%3Butm_medium=RSS | ||
| secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03971en_us | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K34425791?utm_source=f5support&%3Butm_medium=RSS | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03971en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | xeon_platinum_8253_firmware | - | |
| intel | xeon_platinum_8253 | - | |
| intel | xeon_platinum_8256_firmware | - | |
| intel | xeon_platinum_8256 | - | |
| intel | xeon_platinum_8260_firmware | - | |
| intel | xeon_platinum_8260 | - | |
| intel | xeon_platinum_8276_firmware | - | |
| intel | xeon_platinum_8276 | - | |
| intel | xeon_platinum_8276m_firmware | - | |
| intel | xeon_platinum_8276m | - | |
| intel | xeon_platinum_8276l_firmware | - | |
| intel | xeon_platinum_8276l | - | |
| intel | xeon_platinum_8280l_firmware | - | |
| intel | xeon_platinum_8280l | - | |
| intel | xeon_platinum_8260l_firmware | - | |
| intel | xeon_platinum_8260l | - | |
| intel | xeon_platinum_8280m_firmware | - | |
| intel | xeon_platinum_8280m | - | |
| intel | xeon_platinum_8260m_firmware | - | |
| intel | xeon_platinum_8260m | - | |
| intel | xeon_platinum_8280_firmware | - | |
| intel | xeon_platinum_8280 | - | |
| intel | xeon_platinum_8260y_firmware | - | |
| intel | xeon_platinum_8260y | - | |
| intel | xeon_platinum_8268_firmware | - | |
| intel | xeon_platinum_8268 | - | |
| intel | xeon_platinum_8270_firmware | - | |
| intel | xeon_platinum_8270 | - | |
| intel | xeon_platinum_8274_firmware | - | |
| intel | xeon_platinum_8274 | - | |
| intel | xeon_platinum_8284_firmware | - | |
| intel | xeon_platinum_8284 | - | |
| intel | xeon_platinum_9242_firmware | - | |
| intel | xeon_platinum_9242 | - | |
| intel | xeon_platinum_9282_firmware | - | |
| intel | xeon_platinum_9282 | - | |
| intel | xeon_platinum_8153_firmware | - | |
| intel | xeon_platinum_8153 | - | |
| intel | xeon_platinum_8156_firmware | - | |
| intel | xeon_platinum_8156 | - | |
| intel | xeon_platinum_8158_firmware | - | |
| intel | xeon_platinum_8158 | - | |
| intel | xeon_platinum_8176_firmware | - | |
| intel | xeon_platinum_8176 | - | |
| intel | xeon_platinum_8160_firmware | - | |
| intel | xeon_platinum_8160 | - | |
| intel | xeon_platinum_8164_firmware | - | |
| intel | xeon_platinum_8164 | - | |
| intel | xeon_platinum_8168_firmware | - | |
| intel | xeon_platinum_8168 | - | |
| intel | xeon_platinum_8170_firmware | - | |
| intel | xeon_platinum_8170 | - | |
| intel | xeon_platinum_8180_firmware | - | |
| intel | xeon_platinum_8180 | - | |
| intel | xeon_platinum_8160t_firmware | - | |
| intel | xeon_platinum_8160t | - | |
| intel | xeon_platinum_8160f_firmware | - | |
| intel | xeon_platinum_8160f | - | |
| intel | xeon_platinum_8176f_firmware | - | |
| intel | xeon_platinum_8176f | - | |
| intel | xeon_gold_6210u_firmware | - | |
| intel | xeon_gold_6210u | - | |
| intel | xeon_gold_6244_firmware | - | |
| intel | xeon_gold_6244 | - | |
| intel | xeon_gold_6212u_firmware | - | |
| intel | xeon_gold_6212u | - | |
| intel | xeon_gold_6240_firmware | - | |
| intel | xeon_gold_6240 | - | |
| intel | xeon_gold_5218_firmware | - | |
| intel | xeon_gold_5218 | - | |
| intel | xeon_gold_6230_firmware | - | |
| intel | xeon_gold_6230 | - | |
| intel | xeon_gold_5222_firmware | - | |
| intel | xeon_gold_5222 | - | |
| intel | xeon_gold_6238t_firmware | - | |
| intel | xeon_gold_6238t | - | |
| intel | xeon_gold_6248_firmware | - | |
| intel | xeon_gold_6248 | - | |
| intel | xeon_gold_6252_firmware | - | |
| intel | xeon_gold_6252 | - | |
| intel | xeon_gold_6242_firmware | - | |
| intel | xeon_gold_6242 | - | |
| intel | xeon_gold_6240y_firmware | - | |
| intel | xeon_gold_6240y | - | |
| intel | xeon_gold_5217_firmware | - | |
| intel | xeon_gold_5217 | - | |
| intel | xeon_gold_6238m_firmware | - | |
| intel | xeon_gold_6238m | - | |
| intel | xeon_gold_5218n_firmware | - | |
| intel | xeon_gold_5218n | - | |
| intel | xeon_gold_6226_firmware | - | |
| intel | xeon_gold_6226 | - | |
| intel | xeon_gold_6254_firmware | - | |
| intel | xeon_gold_6254 | - | |
| intel | xeon_gold_5220_firmware | - | |
| intel | xeon_gold_5220 | - | |
| intel | xeon_gold_6238l_firmware | - | |
| intel | xeon_gold_6238l | - | |
| intel | xeon_gold_5218b_firmware | - | |
| intel | xeon_gold_5218b | - | |
| intel | xeon_gold_6240l_firmware | - | |
| intel | xeon_gold_6240l | - | |
| intel | xeon_gold_6238_firmware | - | |
| intel | xeon_gold_6238 | - | |
| intel | xeon_gold_6240m_firmware | - | |
| intel | xeon_gold_6240m | - | |
| intel | xeon_gold_5220s_firmware | - | |
| intel | xeon_gold_5220s | - | |
| intel | xeon_gold_5215_firmware | - | |
| intel | xeon_gold_5215 | - | |
| intel | xeon_gold_6222v_firmware | - | |
| intel | xeon_gold_6222v | - | |
| intel | xeon_gold_6252n_firmware | - | |
| intel | xeon_gold_6252n | - | |
| intel | xeon_gold_5215m_firmware | - | |
| intel | xeon_gold_5215m | - | |
| intel | xeon_gold_6246_firmware | - | |
| intel | xeon_gold_6246 | - | |
| intel | xeon_gold_5215l_firmware | - | |
| intel | xeon_gold_5215l | - | |
| intel | xeon_gold_5218t_firmware | - | |
| intel | xeon_gold_5218t | - | |
| intel | xeon_gold_5220t_firmware | - | |
| intel | xeon_gold_5220t | - | |
| intel | xeon_gold_6209u_firmware | - | |
| intel | xeon_gold_6209u | - | |
| intel | xeon_gold_6262v_firmware | - | |
| intel | xeon_gold_6262v | - | |
| intel | xeon_gold_5122_firmware | - | |
| intel | xeon_gold_5122 | - | |
| intel | xeon_gold_6138_firmware | - | |
| intel | xeon_gold_6138 | - | |
| intel | xeon_gold_6148_firmware | - | |
| intel | xeon_gold_6148 | - | |
| intel | xeon_gold_5120t_firmware | - | |
| intel | xeon_gold_5120t | - | |
| intel | xeon_gold_6136_firmware | - | |
| intel | xeon_gold_6136 | - | |
| intel | xeon_gold_6150_firmware | - | |
| intel | xeon_gold_6150 | - | |
| intel | xeon_gold_6152_firmware | - | |
| intel | xeon_gold_6152 | - | |
| intel | xeon_gold_6130_firmware | - | |
| intel | xeon_gold_6130 | - | |
| intel | xeon_gold_6128_firmware | - | |
| intel | xeon_gold_6128 | - | |
| intel | xeon_gold_5118_firmware | - | |
| intel | xeon_gold_5118 | - | |
| intel | xeon_gold_6134_firmware | - | |
| intel | xeon_gold_6134 | - | |
| intel | xeon_gold_6126_firmware | - | |
| intel | xeon_gold_6126 | - | |
| intel | xeon_gold_5120_firmware | - | |
| intel | xeon_gold_5120 | - | |
| intel | xeon_gold_5115_firmware | - | |
| intel | xeon_gold_5115 | - | |
| intel | xeon_gold_6154_firmware | - | |
| intel | xeon_gold_6154 | - | |
| intel | xeon_gold_6140_firmware | - | |
| intel | xeon_gold_6140 | - | |
| intel | xeon_gold_6140m_firmware | - | |
| intel | xeon_gold_6140m | - | |
| intel | xeon_gold_6132_firmware | - | |
| intel | xeon_gold_6132 | - | |
| intel | xeon_gold_6138t_firmware | - | |
| intel | xeon_gold_6138t | - | |
| intel | xeon_gold_6142f_firmware | - | |
| intel | xeon_gold_6142f | - | |
| intel | xeon_gold_6130t_firmware | - | |
| intel | xeon_gold_6130t | - | |
| intel | xeon_gold_6138f_firmware | - | |
| intel | xeon_gold_6138f | - | |
| intel | xeon_gold_6130f_firmware | - | |
| intel | xeon_gold_6130f | - | |
| intel | xeon_gold_6126t_firmware | - | |
| intel | xeon_gold_6126t | - | |
| intel | xeon_gold_6126f_firmware | - | |
| intel | xeon_gold_6126f | - | |
| intel | xeon_gold_6148f_firmware | - | |
| intel | xeon_gold_6148f | - | |
| intel | xeon_gold_6146_firmware | - | |
| intel | xeon_gold_6146 | - | |
| intel | xeon_gold_6144_firmware | - | |
| intel | xeon_gold_6144 | - | |
| intel | xeon_silver_4209t_firmware | - | |
| intel | xeon_silver_4209t | - | |
| intel | xeon_silver_4210_firmware | - | |
| intel | xeon_silver_4210 | - | |
| intel | xeon_silver_4214_firmware | - | |
| intel | xeon_silver_4214 | - | |
| intel | xeon_silver_4214y_firmware | - | |
| intel | xeon_silver_4214y | - | |
| intel | xeon_silver_4215_firmware | - | |
| intel | xeon_silver_4215 | - | |
| intel | xeon_silver_4208_firmware | - | |
| intel | xeon_silver_4208 | - | |
| intel | xeon_silver_4216_firmware | - | |
| intel | xeon_silver_4216 | - | |
| intel | xeon_silver_4116_firmware | - | |
| intel | xeon_silver_4116 | - | |
| intel | xeon_silver_4109t_firmware | - | |
| intel | xeon_silver_4109t | - | |
| intel | xeon_silver_4114_firmware | - | |
| intel | xeon_silver_4114 | - | |
| intel | xeon_silver_4112_firmware | - | |
| intel | xeon_silver_4112 | - | |
| intel | xeon_silver_4108_firmware | - | |
| intel | xeon_silver_4108 | - | |
| intel | xeon_silver_4110_firmware | - | |
| intel | xeon_silver_4110 | - | |
| intel | xeon_bronze_3204_firmware | - | |
| intel | xeon_bronze_3204 | - | |
| intel | xeon_bronze_3106_firmware | - | |
| intel | xeon_bronze_3106 | - | |
| intel | xeon_bronze_3104_firmware | - | |
| intel | xeon_bronze_3104 | - | |
| intel | xeon_d-2187nt_firmware | - | |
| intel | xeon_d-2187nt | - | |
| intel | xeon_d-2183it_firmware | - | |
| intel | xeon_d-2183it | - | |
| intel | xeon_d-2177nt_firmware | - | |
| intel | xeon_d-2177nt | - | |
| intel | xeon_d-2173it_firmware | - | |
| intel | xeon_d-2173it | - | |
| intel | xeon_d-2166nt_firmware | - | |
| intel | xeon_d-2166nt | - | |
| intel | xeon_d-2163it_firmware | - | |
| intel | xeon_d-2163it | - | |
| intel | xeon_d-2161i_firmware | - | |
| intel | xeon_d-2161i | - | |
| intel | xeon_d-2146nt_firmware | - | |
| intel | xeon_d-2146nt | - | |
| intel | xeon_d-2145nt_firmware | - | |
| intel | xeon_d-2145nt | - | |
| intel | xeon_d-2143it_firmware | - | |
| intel | xeon_d-2143it | - | |
| intel | xeon_d-2142it_firmware | - | |
| intel | xeon_d-2142it | - | |
| intel | xeon_d-2141i_firmware | - | |
| intel | xeon_d-2141i | - | |
| intel | xeon_d-2123it_firmware | - | |
| intel | xeon_d-2123it | - | |
| intel | xeon_w-3175x_firmware | - | |
| intel | xeon_w-3175x | - | |
| intel | xeon_w-2195_firmware | - | |
| intel | xeon_w-2195 | - | |
| intel | xeon_w-2175_firmware | - | |
| intel | xeon_w-2175 | - | |
| intel | xeon_w-2155_firmware | - | |
| intel | xeon_w-2155 | - | |
| intel | xeon_w-2145_firmware | - | |
| intel | xeon_w-2145 | - | |
| intel | xeon_w-2135_firmware | - | |
| intel | xeon_w-2135 | - | |
| intel | xeon_w-2133_firmware | - | |
| intel | xeon_w-2133 | - | |
| intel | xeon_w-2125_firmware | - | |
| intel | xeon_w-2125 | - | |
| intel | xeon_w-2123_firmware | - | |
| intel | xeon_w-2123 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "823AD74E-785B-40C9-BA27-F988F5006263",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "433CEBA3-2B72-404D-B561-957CEAC0A5B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D076A4C-EBFF-47CD-898C-E3D8595897DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C35F1845-F913-43E2-AA05-F64FD0A6A736",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D9A1F6-A5BF-4456-9908-A767CF2FF866",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11562A6B-26CD-40A6-9184-7CA128E1F017",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3829529-3EC5-4681-8902-AA581D9C2DDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7F2F3C4-28A2-4C3B-9136-B222797FCB0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C6506-97AA-4E82-9678-E98C58D3F4CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C950976-266D-4258-86CB-8987C093331F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10B8978A-6621-41F4-AEAC-27B3FC5029B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3219701A-8CF0-4307-A957-1E31F6A5C195",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7F4E55-3AA3-40EC-8686-719F8474B3B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BA9357-FDCE-4FE2-ACC1-065E6C0C6994",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5D6779-B826-418F-812B-D1AD926E2D7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDEBFCA-2B4B-4C56-80BF-E14704149F9B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
"matchCriteriaId": "713D5096-EF81-4B61-963D-63B56C03AE68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BEA9978-20AA-4224-A22C-5F0D392A6E1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D89A5F91-2F18-49FA-82B4-0437414751F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BFDF125-D5BD-40A6-8958-68C8F93C913F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D43F33-6733-49BE-87B2-14936230E5C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80DDA8F-A66E-4E20-BA6F-BEDA18CFE711",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39A299B1-2DB1-4388-8369-6C70BDCC5D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0986CB70-7825-4AF9-9358-9698D7F40492",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
"matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE3CED4-BD1B-4B3D-817D-F49F19822EB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "953C818E-B5FB-414C-94C8-E8372A55F610",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4B7AD9-452D-4C53-8785-6B06E3009894",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3A6E6D-FC3F-4218-918C-4571EBD6513D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82A4157F-D890-4FC7-8415-A41C0CDEE8C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E39C9D8-2CD3-4536-8ED0-866D4C7A20F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04304600-5379-4B6F-9FCC-B77AFFB17B91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E97DDE9-A40D-4A94-9789-56B481F81C6C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD440FF2-14BA-40D3-A05B-09211729CD3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23AF1DF3-4044-47E7-9904-19CE0C9C5F2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67B0B7EA-DBC1-4E02-A33E-7180FAB684F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07C007-095A-4C11-A663-E38D624690D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "215608D2-0F48-4E32-963A-2DFE74A84557",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C0E2164-CFCA-4236-A6AD-74484E387639",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AEC407A-5450-468F-B0CB-3028FF92468F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B880E026-665A-4519-87D4-4DCA08977033",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24EEECD1-018A-47FB-8CDA-6786864994B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "761A4FF6-04FA-4DF4-AD51-58DA0211BA1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "262ED175-6056-4FD6-840C-F4523A96677D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19C76503-5F56-4C2B-8973-A3F94B1345DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A6461C-C6F0-4A65-A86E-4420B1ACE6DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D544957-C9D8-4AC1-A7DE-7E6FE000E2E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "352D121E-69C0-470E-AE02-8413DCBE1DC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D02F2-46A7-4359-94BC-7AE15EDE692D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A19FF1B1-F380-4CE7-8C09-DEFF7ED86571",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AF2819-C873-41A9-94F5-B8B34EBC9633",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D162F8D-5836-4B52-A98B-EFB0289C1346",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C5FB6D-C652-4743-84F0-D7BB55F2733F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685FCDB3-F3FF-49C0-A26D-BFC081F2B78D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E317001-0126-4B64-85AE-04AEC9954085",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B51741B-1976-4998-B5DC-5AE1D62F6864",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3943BF-B43A-4077-B75D-EBE27C3D6A17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E231B13-FC1B-41E3-A47D-4F0FC4F37B33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "728C0EE8-D4D9-4426-9709-46505AF901D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54686C14-25E6-4B4B-8ABA-FB115F6DDC3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "938EF635-E09B-448B-A446-48890A209878",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "641570F3-6C32-40C6-8486-626FD4899B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADE3148E-2DCE-4CA9-ABE3-43779D06DD42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC462EF-264D-4365-A965-0BCE9C687496",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5AB911F-8825-4C97-9454-4F5DC5396E2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2411CF40-9A5F-4138-9111-84087A30050F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8141C47E-4F0B-498E-8B18-264E90448C3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB40F57-7944-48CE-AFC6-9531D1E6B71C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA876028-4021-4B58-94C2-89CEBD9CBA23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB7EA5C-D048-4130-83D9-497A1769C851",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4226119-3BCB-4523-BD2E-21BC9C4F2217",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7682FD90-727B-4190-B053-29E29660E397",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0D73FF-6831-4332-B720-DADD9A53C22D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07BB4987-AB65-4054-8528-3C32DEF61540",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13FD9772-975A-48D1-83DF-713F60B5F501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7137FDAC-D47E-4AB6-B7AE-3EA90AFED052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "596D1638-076D-4A57-AB79-22278085CBCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD21434-492F-4657-BEAC-9377ECE62B0A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89565573-AEFF-48C3-BC84-C377C32D4714",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7C0152-876E-4380-A0CA-B0FE79A3EB63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32DCC33-F4C0-449F-9CBB-F9F9895DA684",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FCC5DE-7BFB-4DF9-BB3E-C86AD99360EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A3F4C12-F26B-4BF5-9A4E-125ACC1F9A6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A659499-6C74-49B6-8EFA-AA93E818BC4D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17073B15-57FF-4B06-ACB5-8E51715D20D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D633D7-4CE8-4378-AA86-2FC518705725",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCC81D7-E2EA-439C-9844-3C35C83549FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD67CFA-4E44-45FF-ADCA-DE178FA8D8CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
"matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4DA774-A3D3-4171-B733-42DB8E5D47EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A3CABE-9C4E-4EE5-A2FC-5CDA47893D5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80C54E18-D1A2-4651-9F52-F7846121D4F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2C89DC-2DD0-4F8F-B7F2-A102419D1D1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2B805F-F692-4B71-942A-65BF2AF78FB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE58040F-EE13-4EB5-92B8-7A25595DEA62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDD3F0B-F99F-4D28-98FF-5051E8841638",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63FA88FF-EE13-4B3B-BA06-EDDD5392DF5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2478D053-2E0A-4962-A38D-A05DA6A75D71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "189B8D49-563A-41FA-9849-C0C10678721F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "644C5C4C-4257-4B9F-BE0C-01271B7BE6BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4784CBB2-276A-4742-92F6-0B5A35818B7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE33A02E-5A74-4F9B-BEBE-657F311C0387",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0E4832-F8E5-4718-9358-C2E12049B771",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD96F46-FB80-4E43-802B-2918F8650E3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4E951A-EFE0-4976-BB67-B3996594C8D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEABF4C-68FE-4F14-B19B-0021312264E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3B2FF7-F02F-4FE5-8585-1B242D06CF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F946544A-D4CC-4758-8B26-4FC2AD944F01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A24929-1F33-4AFE-B80B-8F9DCFA141B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8A78D4-3FAC-42C0-8E10-7D4793AEF338",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B774A43F-3EF6-46EE-9909-51A273471FFD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B66C7A1-46DC-417F-A1F0-05CFF95E8C83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F371BC-529E-4787-ABE6-BE7BD937B04F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD77A673-DD3B-431A-ABA6-F00E220819B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E477BD27-BD2C-43BB-9637-2A866575637A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D3795-0A1B-4CC7-BD9F-B75118B4A45F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "965674C3-2816-498F-A2B8-E02847BB6CEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D364DCDC-2A19-402A-8285-57E5E216374B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B137CE46-56D3-484B-AD4B-E57C903DDEFE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7BAC9F6-35CE-4045-9F28-EE5A66C70282",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D231E6E8-6848-4914-B79F-FD44962FED2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF3665E-34AC-43A5-BC48-3365880097D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A62225-DD72-4BDD-9BEA-0DE3577D6743",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCF73F8-7B2E-4B92-AEE4-F59ED8CDD187",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Una protecci\u00f3n insuficiente de la memoria en el modo System Management (SMM) e Intel\u00ae TXT para ciertos procesadores Intel\u00ae Xeon\u00ae, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local."
}
],
"id": "CVE-2019-0152",
"lastModified": "2024-11-21T04:16:21.067",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-14T20:15:11.493",
"references": [
{
"source": "secure@intel.com",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
},
{
"source": "secure@intel.com",
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2019-0152
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2019-0152",
"description": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GSD-2019-0152"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-0152"
],
"details": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GSD-2019-0152",
"modified": "2023-12-13T01:23:39.556498Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0152",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 Intel(R) Processor Security",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"name": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0152"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"name": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-11-27T07:15Z",
"publishedDate": "2019-11-14T20:15Z"
}
}
}
ghsa-jh65-fgr7-8269
Vulnerability from github
Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
{
"affected": [],
"aliases": [
"CVE-2019-0152"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-14T20:15:00Z",
"severity": "HIGH"
},
"details": "Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GHSA-jh65-fgr7-8269",
"modified": "2024-04-04T02:39:15Z",
"published": "2022-05-24T17:00:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0152"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398519.pdf"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K34425791?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03971en_us"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.