Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-11137 (GCVE-0-2019-11137)
Vulnerability from cvelistv5
- Escalation of Privilege, Denial of Service, Information Disclosure
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | 2019.2 IPU – UEFI |
Version: See provided reference |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:48:08.996Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "2019.2 IPU \u2013 UEFI",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege, Denial of Service, Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-22T08:07:05",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-11137",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 UEFI",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service, Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"name": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2019-11137",
"datePublished": "2019-11-14T16:56:56",
"dateReserved": "2019-04-11T00:00:00",
"dateUpdated": "2024-08-04T22:48:08.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-11137\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-11-14T17:15:13.270\",\"lastModified\":\"2024-11-21T04:20:36.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n de entrada insuficiente en el firmware del sistema para Intel\u00ae Xeon\u00ae Scalable Processors, Intel\u00ae Xeon\u00ae Processors D Family, Intel\u00ae Xeon\u00ae Processors E5 v4 Family, Intel\u00ae Xeon\u00ae Processors E7 v4 Family y Intel\u00ae Atom\u00ae processor C Series, puede habilitar a un usuario privilegiado para permitir una escalada de privilegios, una denegaci\u00f3n de servicio y/o una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823AD74E-785B-40C9-BA27-F988F5006263\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6DA7A-7C97-40E1-B31A-B92BB658C429\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433CEBA3-2B72-404D-B561-957CEAC0A5B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF128B-9984-4C91-B7F6-968DE376C3BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D076A4C-EBFF-47CD-898C-E3D8595897DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B167F1-63FA-4C86-84AB-836ABF84E6E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35F1845-F913-43E2-AA05-F64FD0A6A736\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185E8FBC-9EE9-472E-867B-0B0DEEECA13E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D9A1F6-A5BF-4456-9908-A767CF2FF866\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11562A6B-26CD-40A6-9184-7CA128E1F017\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3C00A0-C28A-46EB-853D-DAE3819399D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3829529-3EC5-4681-8902-AA581D9C2DDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CAB607-87B2-49F4-9FAB-662D5EA3D11C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F2F3C4-28A2-4C3B-9136-B222797FCB0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955420F9-3A3F-40E0-9940-DD43C5C78D62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2C6506-97AA-4E82-9678-E98C58D3F4CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C950976-266D-4258-86CB-8987C093331F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B8978A-6621-41F4-AEAC-27B3FC5029B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3219701A-8CF0-4307-A957-1E31F6A5C195\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7F4E55-3AA3-40EC-8686-719F8474B3B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BA9357-FDCE-4FE2-ACC1-065E6C0C6994\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4A437C-6C00-4729-91CC-D27EB3542633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5D6779-B826-418F-812B-D1AD926E2D7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74ED727D-B1A9-4F4B-92C7-3F00F3A80013\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C24951-B3FA-48E6-AFAC-6CA0D2348230\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EDEBFCA-2B4B-4C56-80BF-E14704149F9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713D5096-EF81-4B61-963D-63B56C03AE68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BEA9978-20AA-4224-A22C-5F0D392A6E1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89A5F91-2F18-49FA-82B4-0437414751F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFDF125-D5BD-40A6-8958-68C8F93C913F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8D8C4-29EA-4D09-87AB-A570403BA0E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D43F33-6733-49BE-87B2-14936230E5C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89421EC5-52E5-441F-AD3B-5C5E964F836D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80DDA8F-A66E-4E20-BA6F-BEDA18CFE711\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9236F094-B913-43F2-B703-CE33B9CEBA0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39A299B1-2DB1-4388-8369-6C70BDCC5D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0986CB70-7825-4AF9-9358-9698D7F40492\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345FF353-FE25-41F4-97EC-FF32BE2796EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE3CED4-BD1B-4B3D-817D-F49F19822EB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA2030D-CEAF-46BF-9669-19EAD541BDB6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C818E-B5FB-414C-94C8-E8372A55F610\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A9AD79-9B4B-4EE8-810B-359901C3540C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4B7AD9-452D-4C53-8785-6B06E3009894\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86CCC45-270E-4760-A7E9-D39C74C00FCF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3A6E6D-FC3F-4218-918C-4571EBD6513D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C105930C-D2BB-4FA1-B5D1-882D90D867C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82A4157F-D890-4FC7-8415-A41C0CDEE8C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45227E88-ACFF-43A5-AF45-C6542A6EF681\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E39C9D8-2CD3-4536-8ED0-866D4C7A20F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5168E40-DF2F-4E39-8B5E-9659EBBB99A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04304600-5379-4B6F-9FCC-B77AFFB17B91\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BF77DA-E159-4336-A552-B22BE437670D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E97DDE9-A40D-4A94-9789-56B481F81C6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD440FF2-14BA-40D3-A05B-09211729CD3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1612AE8A-3165-47A3-AEA8-65F4156C48BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23AF1DF3-4044-47E7-9904-19CE0C9C5F2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EA99F9-22C2-47ED-9DDD-928E19C4C51E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B0B7EA-DBC1-4E02-A33E-7180FAB684F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF72F37A-2F28-40E6-A84B-0E1DF63B1812\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D07C007-095A-4C11-A663-E38D624690D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8867B2-F297-4D30-AD43-77B0F67FAE3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215608D2-0F48-4E32-963A-2DFE74A84557\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB72D13B-5880-4CB2-8E80-CB6A39B5A302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F7F6B-847A-479D-B6B1-BBA331D06DE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0E2164-CFCA-4236-A6AD-74484E387639\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED0D492-ADAB-41ED-A283-024D3CED441F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AEC407A-5450-468F-B0CB-3028FF92468F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC498-F558-4C2F-9E14-7897060CA9FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B880E026-665A-4519-87D4-4DCA08977033\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E21977E-7085-46C5-8E89-F952C2EBCE04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EEECD1-018A-47FB-8CDA-6786864994B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"761A4FF6-04FA-4DF4-AD51-58DA0211BA1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAE2B11-B0F5-415F-BD6B-E285EF9C9095\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"262ED175-6056-4FD6-840C-F4523A96677D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8292CC-DACB-489A-BCB2-73DC2C6F944C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C76503-5F56-4C2B-8973-A3F94B1345DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A6461C-C6F0-4A65-A86E-4420B1ACE6DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA49CF7-C6BE-4337-A0A8-A603D8955EE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D544957-C9D8-4AC1-A7DE-7E6FE000E2E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"352D121E-69C0-470E-AE02-8413DCBE1DC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F42D02F2-46A7-4359-94BC-7AE15EDE692D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19FF1B1-F380-4CE7-8C09-DEFF7ED86571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A7D63-4638-480C-94CB-ED06613BA75C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7AF2819-C873-41A9-94F5-B8B34EBC9633\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E2764D-7D6A-4CE0-A628-FFE966A6462F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D162F8D-5836-4B52-A98B-EFB0289C1346\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6ACF161-472E-4088-85C2-5940C9C88D45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C5FB6D-C652-4743-84F0-D7BB55F2733F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B4C84-1258-4F2F-B8A3-55353B3D13BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685FCDB3-F3FF-49C0-A26D-BFC081F2B78D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C375A9D-C7CE-49A6-B08D-9CAB22E16D32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E317001-0126-4B64-85AE-04AEC9954085\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BCB7D2-4B68-4FF8-BFC9-06C39A708C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B51741B-1976-4998-B5DC-5AE1D62F6864\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3E45C-1943-42BA-9F6D-EA64D67BF954\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3943BF-B43A-4077-B75D-EBE27C3D6A17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E231B13-FC1B-41E3-A47D-4F0FC4F37B33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"728C0EE8-D4D9-4426-9709-46505AF901D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067C65E5-5392-4DAF-A6BD-640D78C19CE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54686C14-25E6-4B4B-8ABA-FB115F6DDC3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938EF635-E09B-448B-A446-48890A209878\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178345A5-9A38-4C8F-B3BB-430276FA4998\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA58EFB-7672-4902-ABC1-65217AA617AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641570F3-6C32-40C6-8486-626FD4899B8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADE3148E-2DCE-4CA9-ABE3-43779D06DD42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC462EF-264D-4365-A965-0BCE9C687496\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5AB911F-8825-4C97-9454-4F5DC5396E2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070C20AB-66F2-4EE2-8134-5E40DBB9B9E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2411CF40-9A5F-4138-9111-84087A30050F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B8CDF0-1489-4E4C-B004-A22E06FC10D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8141C47E-4F0B-498E-8B18-264E90448C3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1647DAC-CED6-4DAF-8F82-A42D6D691DF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB40F57-7944-48CE-AFC6-9531D1E6B71C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6456D0-32AE-44A9-9F63-AD64B5E49182\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA876028-4021-4B58-94C2-89CEBD9CBA23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B704835-1250-44E1-923C-5DE2F4DD25D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB7EA5C-D048-4130-83D9-497A1769C851\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A923F6-E352-4752-B7D3-007FE1CAFE06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4226119-3BCB-4523-BD2E-21BC9C4F2217\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E290F38C-7A86-469D-9E6A-F0EC69DBE23A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7682FD90-727B-4190-B053-29E29660E397\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E207648-E57F-4C43-8FDD-049BF9214664\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0D73FF-6831-4332-B720-DADD9A53C22D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFB4646-A5BA-4662-A47F-62407AFEDFF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07BB4987-AB65-4054-8528-3C32DEF61540\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3AF74E-C719-4E55-959D-681174FFFB90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FD9772-975A-48D1-83DF-713F60B5F501\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF30717-CBEF-42F9-AE0D-4F6A1877EA55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7137FDAC-D47E-4AB6-B7AE-3EA90AFED052\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D0351-303B-4ABF-A7FD-734176095307\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596D1638-076D-4A57-AB79-22278085CBCD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25934425-944F-4B9A-8A16-F1DCBF3D5032\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DD21434-492F-4657-BEAC-9377ECE62B0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22243DEF-F01B-4774-AEC1-40D776E1167E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89565573-AEFF-48C3-BC84-C377C32D4714\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087D09E-ADCB-478A-87FD-B7113FD29EFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7C0152-876E-4380-A0CA-B0FE79A3EB63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04EC7421-963C-43F7-9450-2E204BAFF1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32DCC33-F4C0-449F-9CBB-F9F9895DA684\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D609DB7E-AE80-48E0-B7B6-E622B6208ABF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2FCC5DE-7BFB-4DF9-BB3E-C86AD99360EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D64D1ED-A386-4475-99AB-7727DE67E1A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3F4C12-F26B-4BF5-9A4E-125ACC1F9A6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE862F15-69CC-488E-ABE8-1E23A5A1089F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A659499-6C74-49B6-8EFA-AA93E818BC4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B080431-626C-4A7B-AB37-47EE6811A5A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17073B15-57FF-4B06-ACB5-8E51715D20D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E921DEBA-3063-4639-9823-2FDDD8DEA793\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D633D7-4CE8-4378-AA86-2FC518705725\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCC81D7-E2EA-439C-9844-3C35C83549FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD67CFA-4E44-45FF-ADCA-DE178FA8D8CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"383DCE68-3882-4274-AA4A-5E030530E4BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D4DA774-A3D3-4171-B733-42DB8E5D47EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A3CABE-9C4E-4EE5-A2FC-5CDA47893D5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5983B72F-9194-47CB-B444-2ECC6360B686\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80C54E18-D1A2-4651-9F52-F7846121D4F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4E44C3-D29F-4057-AE12-BA19FFFF69E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2C89DC-2DD0-4F8F-B7F2-A102419D1D1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EF77397-85D0-4EC2-9887-2D0D9D253450\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2B805F-F692-4B71-942A-65BF2AF78FB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A5BC76B-A4FC-4702-A544-889E62F8509E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE58040F-EE13-4EB5-92B8-7A25595DEA62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90F0D1EF-2FE1-498A-AE38-BF755A680E88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDD3F0B-F99F-4D28-98FF-5051E8841638\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09C3656-AE49-4F26-BD28-B725E8C40304\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FA88FF-EE13-4B3B-BA06-EDDD5392DF5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EB131A-87DE-45FB-9025-B02EC28C4304\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2478D053-2E0A-4962-A38D-A05DA6A75D71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0E40BC-5745-4AB0-B991-61A0C63DB284\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189B8D49-563A-41FA-9849-C0C10678721F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"644C5C4C-4257-4B9F-BE0C-01271B7BE6BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEFB056-0872-434B-9630-28A1AAEAD470\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4784CBB2-276A-4742-92F6-0B5A35818B7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A62CB9-FB01-45CB-9E10-E72D87C0E1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE33A02E-5A74-4F9B-BEBE-657F311C0387\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B4F7FE-61A3-417A-BAA9-E686A76F3A94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0E4832-F8E5-4718-9358-C2E12049B771\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7305838B-84CA-4BB8-A350-B2D2844F1041\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD96F46-FB80-4E43-802B-2918F8650E3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D356D196-8AB0-4387-A644-C5E68174A60C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4E951A-EFE0-4976-BB67-B3996594C8D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA909754-B60A-4B30-AF42-4C8734E155AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEABF4C-68FE-4F14-B19B-0021312264E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3B2FF7-F02F-4FE5-8585-1B242D06CF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524AFD4-2D9F-4A4B-82F4-13BCDE99041E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F946544A-D4CC-4758-8B26-4FC2AD944F01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8EED1D9-75CC-41E9-9C0C-C648E0717024\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A24929-1F33-4AFE-B80B-8F9DCFA141B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB677676-E793-4158-BF53-3F5ECCECE203\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8A78D4-3FAC-42C0-8E10-7D4793AEF338\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3413CB-86D3-4684-B651-DBACC0660E76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B774A43F-3EF6-46EE-9909-51A273471FFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2117880B-FDD4-4A90-B29B-6D840D26645D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B66C7A1-46DC-417F-A1F0-05CFF95E8C83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB43A67-9DD7-49E6-BA77-220120C90700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F371BC-529E-4787-ABE6-BE7BD937B04F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687CADE-6E49-4284-BD41-6CA2FDD846FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD77A673-DD3B-431A-ABA6-F00E220819B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E477BD27-BD2C-43BB-9637-2A866575637A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786C8BA5-A74D-46FD-8241-12934B6C26B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4B6C48-261B-4B0E-BA2A-7E3060D01F93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"394270FA-3A62-4778-9E38-70CF88B430DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A905368-740B-48FB-8949-D212D637E5E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FC8B26-7611-45B6-A37D-DF7025E2E92D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0297E3-3D66-4174-97EE-832F5E1DC708\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543DB437-425F-4FF7-BDBD-FB5CC17E0056\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D72C6B-6F57-4D37-9363-E741E2931B8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E8DD28-EC33-489F-A71C-2AEACFB16FC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B94CF0F-0A7B-42D1-90AF-28A893DA85D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FD9FEF-2186-4416-93B7-B743657412A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FAC3989-A0CA-465A-9DB9-3C29D617C8AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B97F2B-A3D1-48A3-9FB7-755191FDD720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37012AFD-094E-4742-972F-AEEDDEE4105C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38161238-5D40-485F-B0D2-D7621EC317D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D4C607-D5EA-43C3-AE74-301BF0BA929F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3757F7B-4283-4ABF-974B-59E4E2358035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0327393-DB2A-455B-8E20-3EDB3766CDA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A06D956-804A-47DE-85D2-26BEE9B3E313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B10FCF1-F496-4166-9162-41012C4D2B16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35DE5D2A-7DCF-4398-8514-9BB88DC81B77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCADFB25-DCBB-4901-9E4D-132ED49C7F26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440D381D-D093-474C-8D22-AD610DEAB775\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAAD0F0-9182-46EF-8399-C04FB472BE6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA657873-A9B1-4513-8C60-29FAEC1E22F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B804174C-53DB-4641-BD26-3ECDD9FBD638\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93409D2B-67E1-4410-9013-28E80B2525C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4925D0EA-D524-432F-8417-892BB8C3DDFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9976EF5C-1AFA-4FED-8248-B6638D75743A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"122BD094-E815-4081-B674-B71AC193BE0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3930A6D-64DC-4953-AD7E-EED0C48B048E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61643FC4-4D2C-42A8-ADDB-1866A6F638DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E00698-8A08-433F-8852-8EDC422A53D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE8D02A-E569-499C-8EEB-273FE003364E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D86199-5CF3-4E7A-8295-50F958EA4B4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505E8798-0795-48A9-A55F-88CFF761843D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F2A5C9-C593-4C42-A47E-F563C4696137\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A869936B-3C49-4E13-A467-28CBA4178F40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404409CA-326B-425D-A4E5-1A3C8CC45344\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2577C819-3541-4AF5-87C1-C5ABA32AA709\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6E2595-D9E7-46D6-99C8-336DEB1B4020\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"712B36F5-6217-48BE-BA59-55F4AD9EACDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D4F6F-5874-4F5D-91FD-E265DCE86667\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A84814F-B070-45B0-ABC2-1BAAA212EFD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C57B1AE-7C36-4991-9835-8BA292598B51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA12CAD-F622-4F14-8847-AFD8DC250B40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5872F0A-E0E2-419A-91B4-7A57268CCB25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD387ADD-02CA-4154-BF86-0DBE664FE5F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897D23E-1BC1-4FBB-AD00-422413C1749C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5F33C5-18B0-43B4-A478-DB0478019E6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BD8917-5BEA-491C-B6E8-486FF957A876\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF024983-AAB6-4A1B-BB04-DA015D59F9DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C50FBC-6933-4E98-82B9-A70B1C836ED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540F4FFD-174C-4183-B208-9F7BA81E10A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971C6442-6546-440B-AD74-44A5BB527D11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F8AD4D2-D48B-4F53-A0BA-A90E5A970832\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4D8719-A1B6-4641-9116-B3530AE77DEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA0A03C-21BB-4C5D-85B3-FF579F34E82C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A3B14F2-3FE9-4435-A463-55C0DDF867B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCDD79D-80C4-4A52-94F6-F30237AE0C53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F54775F7-3AFF-4675-A686-A2EC357FEB85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5E65D0-6DB9-41D2-9721-8F1232D8155F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF812F0E-DC8B-404D-ACE3-EA55FA189615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2F3B48-F432-473C-B7AA-881350F4ABC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"243FB5C6-FA42-4148-AA32-8DA43D2A1669\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"829702E9-C0EB-4E4B-A979-41A2235B182B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63259ADB-12AC-43B8-8399-0AD7A4CCF31C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DB082B-E169-4BE0-81DC-B2A7219C4DA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104244E0-C4D7-46A7-999C-07180274E8D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7576BD-43FE-44D2-A665-F78BDA4D964D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46066C5B-DB48-4B83-9E5E-3809D3F7FED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2DE391-0FFA-4F9E-8349-6E41267F74C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA062554-DBBC-4215-9705-1ADA545B5887\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B053DE-AF7F-4A0F-A78D-72AE6E144761\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"124DF9B2-F703-42BF-9737-1777A51D05D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84877243-152D-4E02-A18E-850BE2755CF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C3809F-F701-4969-A27A-294D0ACB9CF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A699BC14-5C2C-4B5F-8863-C9188159399C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C77023B4-99B8-4C36-B384-68445D28783E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942E5B7A-FC4E-4645-9D66-44BD3D46A1F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8104B9-EA92-4AFB-829A-35FDF9E1FE4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"897A798F-BBA4-4412-849E-E8055C310338\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C96C9EBB-4585-425D-81CC-9A2B0C1CF9BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395D579-1812-4F1B-A3F1-B38CDA7ADBD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160A9F6E-18A6-4181-A63C-5F8A13985869\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECBA2DA-44F9-4393-BD50-A13AFFC4CA06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A55CAE1-0334-469F-9230-35D607A42DA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E541F97-BE7B-433A-A073-F0DC2551D95D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC478F61-883E-46BB-A4F9-5833A6DDE6C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99160243-440E-44F5-A36C-C9507823E9AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1420874-49D0-4E69-BD67-26E6C9FC873E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23278D55-861D-4BED-A378-E5AC28D64E26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC5D11E3-FEDE-4453-B89D-78505BD03326\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AACF7B5-E2B4-4F05-827E-7DC74FC0BFD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7C804C-BFAA-4886-9621-C255F2F867B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77FEA398-7001-4FF3-89F5-FE6709FDDD76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A506EE-01BE-41E1-BDC9-67CA676B8638\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2B22D1E-6EDE-4E13-8B52-E532A548B522\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2A5EA2-10A9-4C53-BD0E-1026D5F51B6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12142C64-3833-4422-AF21-4C6D3489B2FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF717C4-6E91-4A86-87E4-D97F70E0936E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768DA6C1-6491-4197-94C9-9B9EFC46B1D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE60C16D-B9F7-4EAA-B240-92202B11F6A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BF382C-DF60-492F-B119-8659929079F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B83717-B20B-4EF9-9750-5C628DE8DA6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B2CBF6-53F4-4603-B96A-795E06F903E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C8F85-28B4-4458-A4F0-2D55336FE34C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"628DC30A-538E-4A38-9AB9-6C6EF1224E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A3A2F8-3908-4083-AB72-301A825FBD1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"568E0211-9975-4C64-AE69-22BF38145889\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD63CDF0-0EF3-4370-9F9D-FE3DF07E39AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1AC5A5-F7B7-4FD1-B598-A8D074690DDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C830F688-BCE6-4A86-9C58-DB34505EC366\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EE4C7B-FFBA-4BC2-A0B0-BD7DD28105F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE67577F-3B63-4995-9E51-19647F4EBB3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA569BAD-9592-4D0F-9522-CB1C05D830C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A081C35C-0D19-4025-AFDE-C3E4C4462124\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4209A314-97AE-467E-B9A7-21CD5FE531C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0DAE24C-19F7-46CF-AC3F-E38066FCE0CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D04C6752-81A8-4828-8865-8977C0343635\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7571BE1-C7C8-4FA4-81B3-9F0F7BED5840\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B2A639-66B6-473F-A505-4ACC70D283D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC3D549-9EF3-436A-B672-693CB1D5C14B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFFA1F0-B260-4534-893A-D85546D198BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9203112A-2E5C-4EF5-B34F-74E66838BE3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8470B7D3-384E-4E14-9E22-EF867E99B39C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA406873-E126-402A-BBD8-46BC22AC4756\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89023F97-9135-434E-A078-D1337401634C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F826234A-2C49-4E02-B586-5CD038A90799\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461C01B3-31DE-49ED-8DEB-C5A4F75276B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A738A2D0-FF0B-4E75-90F7-E0E39D937C5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CAA3389-2F0A-4CDB-9A9F-AB11314192DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E995666-F7F9-42AB-83DA-AE4202B59A90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EACDE0A-40CC-43F4-B636-44AEE2F7DB71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"963AD924-07BB-4E68-B817-AC2A82A5C7C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32C775C-5470-4C35-BC9C-5660B71354F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"396B0F7F-3BF1-49BF-9304-285049FBA318\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD73511B-5C0F-4ABE-B9AB-96756CF135CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3833A360-9D9E-4CFE-9CAC-DC9F0CDA0C52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7602F46C-4BC8-4826-8C2A-CAC75CF588C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"284FF890-627A-4FAC-A8F4-A9B44E3DA397\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D941351-4BEC-40A0-9B17-6D5544B9C97E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72781DBF-E6D4-4BDB-BD6E-9B86EB0224A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1089B3DC-934A-4A76-92CA-CACF68DDDDB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209DE5F9-D191-4720-A53E-1F39BC6567DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB4F7078-8C0C-4690-AD8B-36EC49B6145F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28FD72F-F1CF-4076-9523-E355C20CEED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B14CB7-E892-400E-B795-60207B554EAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F4E301-BF06-44E1-8F15-37FF5B31CB19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC8C5BBE-2911-4F56-B48F-B076CD3BF748\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC204334-6964-4DCA-A62B-BB71FFA5D4EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4328D1DB-7F30-4CA9-ACA9-460E14FE20D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522F7CBA-7480-43D8-A31A-B52872600ED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFED5267-3BA8-4B62-9F18-4ACEE09BF9DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A85ED1D-D2B1-46FB-90A4-0B47EB1EED8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45C3021-428A-470F-9D38-242E2BC03CA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB17C45E-9401-4A21-B537-0432744403AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525FC69B-A75F-48CD-A46E-1872E8A138D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1EECC4-C82D-4871-A554-61A15A496E90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"604284C3-8B21-41B6-A5CE-DE1A9B02E476\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3380FA20-4FEB-4F6D-A86D-A3BF81E8F8D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B80E35-9D85-4844-8573-37F292FAE300\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5AB45CA-5D82-4204-8274-7B0CD0B5C852\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF48C5B-5291-413F-96BB-40A9C2558832\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"113A641C-D291-4BE5-9643-21BA1FB04101\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC66FCE-6577-4E79-81D3-C718D1B343E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8390A9-863C-4687-BEDA-64768191E7C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD6D487-A6AA-4752-9CC4-07065F42F043\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D830FF1B-05A2-47C3-9AA0-06F75F0CF01C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"240D24BD-A84A-4562-B850-56EB9A47507F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3199C4-C5BA-4FC8-9539-21A6C3C85336\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867D3D4D-D8A4-45C5-9F06-B51989C7151E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C950AF-E109-41ED-8A3D-F7151216F01F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6DBE50-7BCF-4A81-88CE-113716482740\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B57D26-455B-48D4-BB27-6A8D84C8D5D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD6BE85-75C2-4C74-BF7C-9B9E34D4BABB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D355937-EE3A-4FE0-B3CB-5B7E19ADE4FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF81E50-8089-4C58-B532-66D482D05E52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97AA9A3F-9ADA-46B6-8CEE-A46564953699\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FE58D0-969D-41E1-802E-39672064AE26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FECF753-354D-40EF-8063-FF93C7FA8B86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D9C8551-D17B-49F4-A3BD-DD393729EA74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376E792F-A029-40B1-83B6-A0C2F40F4B1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77568036-9AFC-47CA-99A4-04C2100CEA2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E18B9E2-0659-4A50-88F6-D3D429EC5F8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C093E8E-3E90-44EE-85E0-B76AD459FFD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158C116D-5E24-4593-A283-F6810E424B5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"708714CC-47E3-422F-A5F6-41EF514C6138\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE5F25C-8092-4A74-B265-4BB720DA1A4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B02B3B-1E22-4BEA-935A-77399C74D7BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33FC1CB-7983-48B9-AF3C-E3CF958B5FA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3605E5-1F1D-493C-AB6B-5FB05FDF112B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF500096-2B4A-476B-BBCA-1FEE100ABC91\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A9506C1-77E3-42D0-A3AC-0EA3DA33D858\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F17C3AB-AC03-427F-B0A9-9EACD2A231C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7750BF9E-2E56-4583-987F-F43D5AC15947\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4058BBB2-268F-47E6-BE5A-992C5F460BC6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A2220F-DE01-4A0E-8A1E-670443FCE6BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F191949-2674-4968-90CC-030D6E8901D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FCF369C-7514-46A1-B20B-769916ADA521\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6893581C-5447-4FAD-BFCB-41727FAB4CF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637B704A-C853-4932-91E8-48DBC1C8A66A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42737F96-25B8-4E3E-AED2-47FA27075A23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E2F70FF-B0A0-4B69-BC03-954FCFDA0480\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65F731F9-59EB-4161-AB8B-506BC336B987\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5541BEF0-105A-4FF8-AB7F-34F5A15D5C65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F35B073-EA5F-4746-AB8B-674C9EAFDC3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4B2C83-ED19-47C9-951F-627E26084286\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D397ED37-60EE-49F0-95F0-2C6F666E9368\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83956A37-ABB6-49C9-983C-4B992BF1ADE9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EA6C3DB-8E6D-4CF8-BD52-B362C83DF4A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C413496-47F4-4A84-8413-B0E641822E03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6107B3F-C7FE-46EF-A80E-1A4DD55F9306\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07AAD3D-D2AD-4B67-B80D-965E89E0C79B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E7FA68-B62B-4EEF-B8EA-665026E1E3F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA3DA22-BFBC-427E-A772-446F14C85534\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC9697A-CEA6-4C64-A380-967BCC5357F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB3753F3-4138-489D-AEBF-20C3936366F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BD8BB7-511D-4C69-9907-07E22FBA7D1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39E5F87A-4190-4C8B-B801-E74F4BFB6DC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC269811-A0BD-4D3A-9741-369D4B8BFCBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3DCA3F7-6E89-4786-B683-369E0976E2BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE48983-8F99-494B-9860-5664EFEB6C45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A21E64A1-71EB-4015-9496-A220C7DDAF12\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1A1967-CEF9-47F8-B02C-1F4FBE78286C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C878C4EB-3A07-4944-A24D-A0D67A159694\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C8C823-2A89-49B5-8E21-02C5D881D2B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67D01577-A8CC-4F59-8F76-EDFD3EF9E986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D320EDF-E62E-4555-8D08-00D9BD2A1F26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A577E3B-DEC3-4FE4-8D96-27ECE666172C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAC05EA-AA3B-4BD2-8FE2-6B3963BC39C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C290D7AC-D9C3-478D-B61F-8F54036A6DA2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E988520D-BABE-40DF-A441-25A8BC2B3268\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB77496-F7A7-494E-9E51-24901741BFEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75724C74-9495-4EEC-8A40-7808CCE3D29A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1063DE44-0789-4059-B40F-48A55545E660\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59CD7DDA-6DDA-47CF-9A75-AFA75B02A56F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED01CE89-71D4-4F6B-8439-E693CCD978C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9DD816-EF8D-41C7-B015-870ECBD1DEC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42791E03-655B-4191-BBBA-0055C12649EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD74B036-6637-411E-9898-518CB526A1D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9BEE43-BD62-44A6-836C-65FA94405F73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E82535A-02C5-4AFC-81C4-9CFBBF9ACB3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E56B401-3205-45F1-AA32-FFE6330C82CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C22B03-1C16-4464-BDBF-8A3BBA5D52D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D81E9C2E-FC79-43CC-9780-F533EE1880E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DC14BE-0C3B-426E-9203-434B89120676\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC79478-5CC7-4343-B30D-D2C9A2B95782\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7377FC51-D3E6-4483-A318-5609F0190E2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"110A5A96-39F0-4DE6-9CA2-9C090BE2EEE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"76BF98B8-E64F-4426-A596-758BD6F08A8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25FD273-0E16-4975-985C-8BD96AE0D449\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"8B9ECC00-9156-4BCC-BE83-C5B95F08B622\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419470B4-80EF-46BF-8DB4-6569D3E8435F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"78F8508E-6E46-4F9E-91F9-EBEA8CB5F80D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8389F7F-7653-4695-91CC-DCFACC870094\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"CAA58491-88B5-46E1-8445-BBD202D08BED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8545248A-2943-4B8D-A295-BE7D43492BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"E3D52E0F-CC78-4C2C-82EE-FD417E931C1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD08B95A-240C-436E-91B5-2D594F6F1F07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"0B6148FC-AC08-4792-927C-525EFCD8DE33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D81BA5-E5D8-4D42-8C42-A91063008359\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"10003012-8FA4-4AE6-B53A-08E243103A47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C77CAF-0A18-4447-93BD-C64595475E37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"C47996BA-45A3-4E2A-8363-7534F410B8C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5876FB45-B037-4355-BAE9-69157FD0A402\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"F7EFAF70-6058-4183-A9EB-758A3A2BB5F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DE16BA-939E-4C26-B03B-439E60C7C872\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"EAF8588F-FC95-4BA5-86A6-1A9D467A12EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB32875E-11E3-443E-809C-12CCAE574570\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"71F6C5FF-5707-40C2-A6FB-294A4B2286EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"A51F295E-F02E-42C0-A41F-2FC06DEC6369\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"F2FDE404-A629-4B74-BD3A-1265615574B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"1E678777-11D5-4AC2-9234-486067845D9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"01AC298E-62B7-4174-A95C-94A86310AE7C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B224273-2E15-41F2-84D6-D754F6B76B49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"F2AD39B0-92C1-4320-B747-3F6196E685EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"AB00E6B6-C3F6-47DB-A3BD-64DA4A537888\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19188281-533B-450E-84F1-089F3300D08E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.20\",\"matchCriteriaId\":\"139B10CE-1A41-44B7-9005-E69ABAF6AF6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853AF641-B81C-4FB7-89AB-EACF420F0C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"81C0D163-8BF3-479D-8D39-ADB5EE83E413\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E685C0-E20A-4E95-A76F-8D18AF92C0F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"C9B28A6A-B054-4B29-8A89-4D89DCFDC68C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D230E7A-D852-4040-83CF-164AA3233F00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"8992B556-450E-4B84-B940-530B1B488DFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EB6796-FE83-42EB-84FF-F405289EE0B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"7B49CBF4-305A-4095-89D8-91A3DCDFCCE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2068295-B73A-4C01-8351-C2D8B957845B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"21562984-FCDC-4FFE-9353-44663C1B3C7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52F6D2D0-482F-4B2F-AF78-82BC56704E8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"4B451FC3-D364-494A-A1B2-4A35727E1B8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A65EC0-14C7-4838-913D-8EF11144A85B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"51C71ED8-B629-493C-A84F-36F778E3E582\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E4F18F-55E2-4829-A1EF-881D06CC5481\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"998F5EFD-091F-4FBE-8223-142A6A83DDC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1AD90B1-F95C-4A74-AAD5-684C0E0DCBC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"C3F2383A-A686-4D99-90AA-853424468825\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B65F98-15A8-48FA-A836-97430AF183EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"20E83560-BD97-4E15-B77A-D0DEC53788D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF640F8-B432-40DA-93C8-77D8351CB390\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"B44100F9-F1FC-444B-A2F4-05C434B7F1C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4F7E5C6-201B-4268-9CA7-13BBA1E74DF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"EEF3F03B-9A81-482C-97B6-8FC707ADA1A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C838C36-FFF2-4C90-8BF1-21984D6C9C88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"DA98FED1-7EB6-4FDD-9369-CE2888F698C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CEE8B85-1F21-418F-B2D3-90151F6423BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"A93DFA25-ED4C-42E4-9D51-2C5ECE96C6CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E62FEEB-A62D-42F4-A713-4CEAFF9B158E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"653154AC-2149-4A59-B8A1-EDADA0072365\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA80708D-3219-4D54-B167-105DDEC5B85D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"3CF8640F-CD4B-45D3-A58A-DCF9179BC1B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BA2C97-7AAB-4A55-B487-522715BDC80C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"C00A9B50-7CA1-42E1-9AC0-6AA19692842D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58AE85AC-1062-42E2-8142-9BC754D51035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"254CC1CC-2D1B-4A87-A634-D4A16DBD62C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBAD3B0-D47D-4E05-96D1-28A989E118CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"A8099719-2DE8-44DE-91BA-2A00E6FAE7A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"789F7158-51DE-4344-BD8A-1249BFE0158B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"8D10F86F-26A9-4E9D-9264-12E52A4E3C3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BE9486-493D-495E-8CFA-1E79FE57457C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"52FB5522-5C69-4D44-B74C-4C4C87CE0450\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2703B986-0709-4D89-8CAF-7C3FB63D7D3F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"30B25ADF-E58E-4553-B8F0-80A438DF9240\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3268D0-1F66-47BA-972C-21E809DC2F2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"3B1E89C3-3DC3-4AF2-BAB2-7FD187BB28C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20D38E9-B2EA-4ECC-B9EC-D29BB249AC77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"42F5768D-2F77-4A58-8558-D2D95D8CA0A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BB05A81-BDF5-4D6C-B9E3-1894703F1CC3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"F4E4AF56-8B36-43B9-A5BE-BAC7A40A8956\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E10A5D-7C64-460A-9DBE-E5BCBBFDE6C9\"}]}]}],\"references\":[{\"url\":\"https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secure@intel.com\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
WID-SEC-W-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
wid-sec-w-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
ghsa-9vvw-6c33-3283
Vulnerability from github
Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
{
"affected": [],
"aliases": [
"CVE-2019-11137"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-14T17:15:00Z",
"severity": "HIGH"
},
"details": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.",
"id": "GHSA-9vvw-6c33-3283",
"modified": "2024-04-04T02:39:24Z",
"published": "2022-05-24T17:00:56Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11137"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2019-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les microgiciels Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel PTT versions antérieures à 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-X_x antérieures à SPS_SoC-X_04.00.04.086.0 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x antérieures à 11.22.70 | ||
| Intel | N/A | Les processeurs Intel, voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x antérieures à 13.0.10 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x antérieures à 12.0.45 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions antérieures à 11.8.70 | ||
| Intel | N/A | Intel SPS versions SPS_E5_x antérieures à SPS_E5_04.00.04.381.0 | ||
| Intel | N/A | Intel SPS versions SPS_E3_x antérieures à SPS_E3_04.01.04.054.0 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-A_x antérieures à SPS_SoC-A_04.00.04.181.0 | ||
| Intel | N/A | Le microgiciel des contrôleurs Ethernet Intel séries 700 versions antérieures à 7.0 | ||
| Intel | N/A | Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Le logiciel pour contrôleurs Ethernet Intel séries 700 versions antérieure à 24.0 | ||
| Intel | N/A | Intel TXE versions 3.0.x et 3.1.x antérieures à 3.1.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x antérieures à 11.11.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x antérieures à 14.0.10 | ||
| Intel | N/A | Intel TXE versions 4.0.x antérieures à 4.0.20 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel PTT versions ant\u00e9rieures \u00e0 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-X_x ant\u00e9rieures \u00e0 SPS_SoC-X_04.00.04.086.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x ant\u00e9rieures \u00e0 11.22.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les processeurs Intel, voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x ant\u00e9rieures \u00e0 13.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x ant\u00e9rieures \u00e0 12.0.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions ant\u00e9rieures \u00e0 11.8.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E5_x ant\u00e9rieures \u00e0 SPS_E5_04.00.04.381.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E3_x ant\u00e9rieures \u00e0 SPS_E3_04.01.04.054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-A_x ant\u00e9rieures \u00e0 SPS_SoC-A_04.00.04.181.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le microgiciel des contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le logiciel pour contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieure \u00e0 24.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 3.0.x et 3.1.x ant\u00e9rieures \u00e0 3.1.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x ant\u00e9rieures \u00e0 11.11.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x ant\u00e9rieures \u00e0 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0143"
},
{
"name": "CVE-2019-11179",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11179"
},
{
"name": "CVE-2019-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
},
{
"name": "CVE-2019-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0150"
},
{
"name": "CVE-2019-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2019-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
},
{
"name": "CVE-2019-11170",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11170"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2019-11137",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11137"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2019-11175",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11175"
},
{
"name": "CVE-2019-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0139"
},
{
"name": "CVE-2019-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0140"
},
{
"name": "CVE-2019-11172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11172"
},
{
"name": "CVE-2019-11177",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11177"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2019-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0141"
},
{
"name": "CVE-2019-11136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11136"
},
{
"name": "CVE-2019-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0149"
},
{
"name": "CVE-2019-11181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11181"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2019-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0144"
},
{
"name": "CVE-2019-11173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11173"
},
{
"name": "CVE-2019-11182",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11182"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2019-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0124"
},
{
"name": "CVE-2019-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
},
{
"name": "CVE-2019-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11168"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2019-11171",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11171"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0142"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2019-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0146"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2019-11178",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11178"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2019-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
},
{
"name": "CVE-2019-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
},
{
"name": "CVE-2019-11180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11180"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0148"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2019-11174",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11174"
},
{
"name": "CVE-2019-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0145"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2019-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0147"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les microgiciels\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les microgiciels Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00313 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00219 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00270 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00210 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00240 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00255 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00271 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00260 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00280 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00164 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00241 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00220 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
}
]
}
fkie_cve-2019-11137
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://support.f5.com/csp/article/K56215245?utm_source=f5support&%3Butm_medium=RSS | ||
| secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03967en_us | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K56215245?utm_source=f5support&%3Butm_medium=RSS | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03967en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | xeon_platinum_8253_firmware | - | |
| intel | xeon_platinum_8253 | - | |
| intel | xeon_platinum_8256_firmware | - | |
| intel | xeon_platinum_8256 | - | |
| intel | xeon_platinum_8260_firmware | - | |
| intel | xeon_platinum_8260 | - | |
| intel | xeon_platinum_8276_firmware | - | |
| intel | xeon_platinum_8276 | - | |
| intel | xeon_platinum_8276m_firmware | - | |
| intel | xeon_platinum_8276m | - | |
| intel | xeon_platinum_8276l_firmware | - | |
| intel | xeon_platinum_8276l | - | |
| intel | xeon_platinum_8280l_firmware | - | |
| intel | xeon_platinum_8280l | - | |
| intel | xeon_platinum_8260l_firmware | - | |
| intel | xeon_platinum_8260l | - | |
| intel | xeon_platinum_8280m_firmware | - | |
| intel | xeon_platinum_8280m | - | |
| intel | xeon_platinum_8260m_firmware | - | |
| intel | xeon_platinum_8260m | - | |
| intel | xeon_platinum_8280_firmware | - | |
| intel | xeon_platinum_8280 | - | |
| intel | xeon_platinum_8260y_firmware | - | |
| intel | xeon_platinum_8260y | - | |
| intel | xeon_platinum_8268_firmware | - | |
| intel | xeon_platinum_8268 | - | |
| intel | xeon_platinum_8270_firmware | - | |
| intel | xeon_platinum_8270 | - | |
| intel | xeon_platinum_8274_firmware | - | |
| intel | xeon_platinum_8274 | - | |
| intel | xeon_platinum_8284_firmware | - | |
| intel | xeon_platinum_8284 | - | |
| intel | xeon_platinum_9242_firmware | - | |
| intel | xeon_platinum_9242 | - | |
| intel | xeon_platinum_9282_firmware | - | |
| intel | xeon_platinum_9282 | - | |
| intel | xeon_platinum_8153_firmware | - | |
| intel | xeon_platinum_8153 | - | |
| intel | xeon_platinum_8156_firmware | - | |
| intel | xeon_platinum_8156 | - | |
| intel | xeon_platinum_8158_firmware | - | |
| intel | xeon_platinum_8158 | - | |
| intel | xeon_platinum_8176_firmware | - | |
| intel | xeon_platinum_8176 | - | |
| intel | xeon_platinum_8160_firmware | - | |
| intel | xeon_platinum_8160 | - | |
| intel | xeon_platinum_8164_firmware | - | |
| intel | xeon_platinum_8164 | - | |
| intel | xeon_platinum_8168_firmware | - | |
| intel | xeon_platinum_8168 | - | |
| intel | xeon_platinum_8170_firmware | - | |
| intel | xeon_platinum_8170 | - | |
| intel | xeon_platinum_8180_firmware | - | |
| intel | xeon_platinum_8180 | - | |
| intel | xeon_platinum_8160t_firmware | - | |
| intel | xeon_platinum_8160t | - | |
| intel | xeon_platinum_8160f_firmware | - | |
| intel | xeon_platinum_8160f | - | |
| intel | xeon_platinum_8176f_firmware | - | |
| intel | xeon_platinum_8176f | - | |
| intel | xeon_gold_6210u_firmware | - | |
| intel | xeon_gold_6210u | - | |
| intel | xeon_gold_6244_firmware | - | |
| intel | xeon_gold_6244 | - | |
| intel | xeon_gold_6212u_firmware | - | |
| intel | xeon_gold_6212u | - | |
| intel | xeon_gold_6240_firmware | - | |
| intel | xeon_gold_6240 | - | |
| intel | xeon_gold_5218_firmware | - | |
| intel | xeon_gold_5218 | - | |
| intel | xeon_gold_6230_firmware | - | |
| intel | xeon_gold_6230 | - | |
| intel | xeon_gold_5222_firmware | - | |
| intel | xeon_gold_5222 | - | |
| intel | xeon_gold_6238t_firmware | - | |
| intel | xeon_gold_6238t | - | |
| intel | xeon_gold_6248_firmware | - | |
| intel | xeon_gold_6248 | - | |
| intel | xeon_gold_6252_firmware | - | |
| intel | xeon_gold_6252 | - | |
| intel | xeon_gold_6242_firmware | - | |
| intel | xeon_gold_6242 | - | |
| intel | xeon_gold_6240y_firmware | - | |
| intel | xeon_gold_6240y | - | |
| intel | xeon_gold_5217_firmware | - | |
| intel | xeon_gold_5217 | - | |
| intel | xeon_gold_6238m_firmware | - | |
| intel | xeon_gold_6238m | - | |
| intel | xeon_gold_5218n_firmware | - | |
| intel | xeon_gold_5218n | - | |
| intel | xeon_gold_6226_firmware | - | |
| intel | xeon_gold_6226 | - | |
| intel | xeon_gold_6254_firmware | - | |
| intel | xeon_gold_6254 | - | |
| intel | xeon_gold_5220_firmware | - | |
| intel | xeon_gold_5220 | - | |
| intel | xeon_gold_6238l_firmware | - | |
| intel | xeon_gold_6238l | - | |
| intel | xeon_gold_5218b_firmware | - | |
| intel | xeon_gold_5218b | - | |
| intel | xeon_gold_6240l_firmware | - | |
| intel | xeon_gold_6240l | - | |
| intel | xeon_gold_6238_firmware | - | |
| intel | xeon_gold_6238 | - | |
| intel | xeon_gold_6240m_firmware | - | |
| intel | xeon_gold_6240m | - | |
| intel | xeon_gold_5220s_firmware | - | |
| intel | xeon_gold_5220s | - | |
| intel | xeon_gold_5215_firmware | - | |
| intel | xeon_gold_5215 | - | |
| intel | xeon_gold_6222v_firmware | - | |
| intel | xeon_gold_6222v | - | |
| intel | xeon_gold_6252n_firmware | - | |
| intel | xeon_gold_6252n | - | |
| intel | xeon_gold_5215m_firmware | - | |
| intel | xeon_gold_5215m | - | |
| intel | xeon_gold_6246_firmware | - | |
| intel | xeon_gold_6246 | - | |
| intel | xeon_gold_5215l_firmware | - | |
| intel | xeon_gold_5215l | - | |
| intel | xeon_gold_5218t_firmware | - | |
| intel | xeon_gold_5218t | - | |
| intel | xeon_gold_5220t_firmware | - | |
| intel | xeon_gold_5220t | - | |
| intel | xeon_gold_6209u_firmware | - | |
| intel | xeon_gold_6209u | - | |
| intel | xeon_gold_6262v_firmware | - | |
| intel | xeon_gold_6262v | - | |
| intel | xeon_gold_5122_firmware | - | |
| intel | xeon_gold_5122 | - | |
| intel | xeon_gold_6138_firmware | - | |
| intel | xeon_gold_6138 | - | |
| intel | xeon_gold_6148_firmware | - | |
| intel | xeon_gold_6148 | - | |
| intel | xeon_gold_5120t_firmware | - | |
| intel | xeon_gold_5120t | - | |
| intel | xeon_gold_6136_firmware | - | |
| intel | xeon_gold_6136 | - | |
| intel | xeon_gold_6150_firmware | - | |
| intel | xeon_gold_6150 | - | |
| intel | xeon_gold_6152_firmware | - | |
| intel | xeon_gold_6152 | - | |
| intel | xeon_gold_6130_firmware | - | |
| intel | xeon_gold_6130 | - | |
| intel | xeon_gold_6128_firmware | - | |
| intel | xeon_gold_6128 | - | |
| intel | xeon_gold_5118_firmware | - | |
| intel | xeon_gold_5118 | - | |
| intel | xeon_gold_6134_firmware | - | |
| intel | xeon_gold_6134 | - | |
| intel | xeon_gold_6126_firmware | - | |
| intel | xeon_gold_6126 | - | |
| intel | xeon_gold_5120_firmware | - | |
| intel | xeon_gold_5120 | - | |
| intel | xeon_gold_5115_firmware | - | |
| intel | xeon_gold_5115 | - | |
| intel | xeon_gold_6154_firmware | - | |
| intel | xeon_gold_6154 | - | |
| intel | xeon_gold_6140_firmware | - | |
| intel | xeon_gold_6140 | - | |
| intel | xeon_gold_6140m_firmware | - | |
| intel | xeon_gold_6140m | - | |
| intel | xeon_gold_6132_firmware | - | |
| intel | xeon_gold_6132 | - | |
| intel | xeon_gold_6138t_firmware | - | |
| intel | xeon_gold_6138t | - | |
| intel | xeon_gold_6142f_firmware | - | |
| intel | xeon_gold_6142f | - | |
| intel | xeon_gold_6130t_firmware | - | |
| intel | xeon_gold_6130t | - | |
| intel | xeon_gold_6138f_firmware | - | |
| intel | xeon_gold_6138f | - | |
| intel | xeon_gold_6130f_firmware | - | |
| intel | xeon_gold_6130f | - | |
| intel | xeon_gold_6126t_firmware | - | |
| intel | xeon_gold_6126t | - | |
| intel | xeon_gold_6126f_firmware | - | |
| intel | xeon_gold_6126f | - | |
| intel | xeon_gold_6148f_firmware | - | |
| intel | xeon_gold_6148f | - | |
| intel | xeon_gold_6146_firmware | - | |
| intel | xeon_gold_6146 | - | |
| intel | xeon_gold_6144_firmware | - | |
| intel | xeon_gold_6144 | - | |
| intel | xeon_silver_4209t_firmware | - | |
| intel | xeon_silver_4209t | - | |
| intel | xeon_silver_4210_firmware | - | |
| intel | xeon_silver_4210 | - | |
| intel | xeon_silver_4214_firmware | - | |
| intel | xeon_silver_4214 | - | |
| intel | xeon_silver_4214y_firmware | - | |
| intel | xeon_silver_4214y | - | |
| intel | xeon_silver_4215_firmware | - | |
| intel | xeon_silver_4215 | - | |
| intel | xeon_silver_4208_firmware | - | |
| intel | xeon_silver_4208 | - | |
| intel | xeon_silver_4216_firmware | - | |
| intel | xeon_silver_4216 | - | |
| intel | xeon_silver_4116_firmware | - | |
| intel | xeon_silver_4116 | - | |
| intel | xeon_silver_4109t_firmware | - | |
| intel | xeon_silver_4109t | - | |
| intel | xeon_silver_4114_firmware | - | |
| intel | xeon_silver_4114 | - | |
| intel | xeon_silver_4112_firmware | - | |
| intel | xeon_silver_4112 | - | |
| intel | xeon_silver_4108_firmware | - | |
| intel | xeon_silver_4108 | - | |
| intel | xeon_silver_4110_firmware | - | |
| intel | xeon_silver_4110 | - | |
| intel | xeon_bronze_3204_firmware | - | |
| intel | xeon_bronze_3204 | - | |
| intel | xeon_bronze_3106_firmware | - | |
| intel | xeon_bronze_3106 | - | |
| intel | xeon_bronze_3104_firmware | - | |
| intel | xeon_bronze_3104 | - | |
| intel | xeon_d-1602_firmware | - | |
| intel | xeon_d-1602 | - | |
| intel | xeon_d-1653n_firmware | - | |
| intel | xeon_d-1653n | - | |
| intel | xeon_d-1622_firmware | - | |
| intel | xeon_d-1622 | - | |
| intel | xeon_d-1623n_firmware | - | |
| intel | xeon_d-1623n | - | |
| intel | xeon_d-1627_firmware | - | |
| intel | xeon_d-1627 | - | |
| intel | xeon_d-1637_firmware | - | |
| intel | xeon_d-1637 | - | |
| intel | xeon_d-1633n_firmware | - | |
| intel | xeon_d-1633n | - | |
| intel | xeon_d-1649n_firmware | - | |
| intel | xeon_d-1649n | - | |
| intel | xeon_d-2141i_firmware | - | |
| intel | xeon_d-2141i | - | |
| intel | xeon_d-2177nt_firmware | - | |
| intel | xeon_d-2177nt | - | |
| intel | xeon_d-2161i_firmware | - | |
| intel | xeon_d-2161i | - | |
| intel | xeon_d-2143it_firmware | - | |
| intel | xeon_d-2143it | - | |
| intel | xeon_d-2146nt_firmware | - | |
| intel | xeon_d-2146nt | - | |
| intel | xeon_d-2145nt_firmware | - | |
| intel | xeon_d-2145nt | - | |
| intel | xeon_d-2123it_firmware | - | |
| intel | xeon_d-2123it | - | |
| intel | xeon_d-2173it_firmware | - | |
| intel | xeon_d-2173it | - | |
| intel | xeon_d-2191_firmware | - | |
| intel | xeon_d-2191 | - | |
| intel | xeon_d-2187nt_firmware | - | |
| intel | xeon_d-2187nt | - | |
| intel | xeon_d-2142it_firmware | - | |
| intel | xeon_d-2142it | - | |
| intel | xeon_d-2163it_firmware | - | |
| intel | xeon_d-2163it | - | |
| intel | xeon_d-2183it_firmware | - | |
| intel | xeon_d-2183it | - | |
| intel | xeon_d-2166nt_firmware | - | |
| intel | xeon_d-2166nt | - | |
| intel | xeon_d-1533n_firmware | - | |
| intel | xeon_d-1533n | - | |
| intel | xeon_d-1513n_firmware | - | |
| intel | xeon_d-1513n | - | |
| intel | xeon_d-1543n_firmware | - | |
| intel | xeon_d-1543n | - | |
| intel | xeon_d-1523n_firmware | - | |
| intel | xeon_d-1523n | - | |
| intel | xeon_d-1553n_firmware | - | |
| intel | xeon_d-1553n | - | |
| intel | xeon_d-1539_firmware | - | |
| intel | xeon_d-1539 | - | |
| intel | xeon_d-1529_firmware | - | |
| intel | xeon_d-1529 | - | |
| intel | xeon_d-1559_firmware | - | |
| intel | xeon_d-1559 | - | |
| intel | xeon_d-1557_firmware | - | |
| intel | xeon_d-1557 | - | |
| intel | xeon_d-1567_firmware | - | |
| intel | xeon_d-1567 | - | |
| intel | xeon_d-1577_firmware | - | |
| intel | xeon_d-1577 | - | |
| intel | xeon_d-1571_firmware | - | |
| intel | xeon_d-1571 | - | |
| intel | xeon_d-1528_firmware | - | |
| intel | xeon_d-1528 | - | |
| intel | xeon_d-1541_firmware | - | |
| intel | xeon_d-1541 | - | |
| intel | xeon_d-1518_firmware | - | |
| intel | xeon_d-1518 | - | |
| intel | xeon_d-1521_firmware | - | |
| intel | xeon_d-1521 | - | |
| intel | xeon_d-1531_firmware | - | |
| intel | xeon_d-1531 | - | |
| intel | xeon_d-1548_firmware | - | |
| intel | xeon_d-1548 | - | |
| intel | xeon_d-1527_firmware | - | |
| intel | xeon_d-1527 | - | |
| intel | xeon_d-1537_firmware | - | |
| intel | xeon_d-1537 | - | |
| intel | xeon_d-1520_firmware | - | |
| intel | xeon_d-1520 | - | |
| intel | xeon_d-1540_firmware | - | |
| intel | xeon_d-1540 | - | |
| intel | xeon_e5-2699a_v4_firmware | - | |
| intel | xeon_e5-2699a_v4 | - | |
| intel | xeon_e5-4627_v4_firmware | - | |
| intel | xeon_e5-4627_v4 | - | |
| intel | xeon_e5-4610_v4_firmware | - | |
| intel | xeon_e5-4610_v4 | - | |
| intel | xeon_e5-4620_v4_firmware | - | |
| intel | xeon_e5-4620_v4 | - | |
| intel | xeon_e5-4628l_v4_firmware | - | |
| intel | xeon_e5-4628l_v4 | - | |
| intel | xeon_e5-4660_v4_firmware | - | |
| intel | xeon_e5-4660_v4 | - | |
| intel | xeon_e5-4640_v4_firmware | - | |
| intel | xeon_e5-4640_v4 | - | |
| intel | xeon_e5-4669_v4_firmware | - | |
| intel | xeon_e5-4669_v4 | - | |
| intel | xeon_e5-4667_v4_firmware | - | |
| intel | xeon_e5-4667_v4 | - | |
| intel | xeon_e5-4655_v4_firmware | - | |
| intel | xeon_e5-4655_v4 | - | |
| intel | xeon_e5-4650_v4_firmware | - | |
| intel | xeon_e5-4650_v4 | - | |
| intel | xeon_e5-1660_v4_firmware | - | |
| intel | xeon_e5-1660_v4 | - | |
| intel | xeon_e5-1630_v4_firmware | - | |
| intel | xeon_e5-1630_v4 | - | |
| intel | xeon_e5-1620_v4_firmware | - | |
| intel | xeon_e5-1620_v4 | - | |
| intel | xeon_e5-1680_v4_firmware | - | |
| intel | xeon_e5-1680_v4 | - | |
| intel | xeon_e5-1650_v4_firmware | - | |
| intel | xeon_e5-1650_v4 | - | |
| intel | xeon_e5-2687w_v4_firmware | - | |
| intel | xeon_e5-2687w_v4 | - | |
| intel | xeon_e5-2695_v4_firmware | - | |
| intel | xeon_e5-2695_v4 | - | |
| intel | xeon_e5-2690_v4_firmware | - | |
| intel | xeon_e5-2690_v4 | - | |
| intel | xeon_e5-2699_v4_firmware | - | |
| intel | xeon_e5-2699_v4 | - | |
| intel | xeon_e5-2650l_v4_firmware | - | |
| intel | xeon_e5-2650l_v4 | - | |
| intel | xeon_e5-2658_v4_firmware | - | |
| intel | xeon_e5-2658_v4 | - | |
| intel | xeon_e5-2698_v4_firmware | - | |
| intel | xeon_e5-2698_v4 | - | |
| intel | xeon_e5-2660_v4_firmware | - | |
| intel | xeon_e5-2660_v4 | - | |
| intel | xeon_e5-2680_v4_firmware | - | |
| intel | xeon_e5-2680_v4 | - | |
| intel | xeon_e5-2697_v4_firmware | - | |
| intel | xeon_e5-2697_v4 | - | |
| intel | xeon_e5-2683_v4_firmware | - | |
| intel | xeon_e5-2683_v4 | - | |
| intel | xeon_e5-2628l_v4_firmware | - | |
| intel | xeon_e5-2628l_v4 | - | |
| intel | xeon_e5-2650_v4_firmware | - | |
| intel | xeon_e5-2650_v4 | - | |
| intel | xeon_e5-2697a_v4_firmware | - | |
| intel | xeon_e5-2697a_v4 | - | |
| intel | xeon_e5-2648l_v4_firmware | - | |
| intel | xeon_e5-2648l_v4 | - | |
| intel | xeon_e5-2620_v4_firmware | - | |
| intel | xeon_e5-2620_v4 | - | |
| intel | xeon_e5-2630l_v4_firmware | - | |
| intel | xeon_e5-2630l_v4 | - | |
| intel | xeon_e5-2608l_v4_firmware | - | |
| intel | xeon_e5-2608l_v4 | - | |
| intel | xeon_e5-2667_v4_firmware | - | |
| intel | xeon_e5-2667_v4 | - | |
| intel | xeon_e5-2643_v4_firmware | - | |
| intel | xeon_e5-2643_v4 | - | |
| intel | xeon_e5-2623_v4_firmware | - | |
| intel | xeon_e5-2623_v4 | - | |
| intel | xeon_e5-2609_v4_firmware | - | |
| intel | xeon_e5-2609_v4 | - | |
| intel | xeon_e5-2630_v4_firmware | - | |
| intel | xeon_e5-2630_v4 | - | |
| intel | xeon_e5-2618l_v4_firmware | - | |
| intel | xeon_e5-2618l_v4 | - | |
| intel | xeon_e5-2637_v4_firmware | - | |
| intel | xeon_e5-2637_v4 | - | |
| intel | xeon_e5-2603_v4_firmware | - | |
| intel | xeon_e5-2603_v4 | - | |
| intel | xeon_e5-2640_v4_firmware | - | |
| intel | xeon_e5-2640_v4 | - | |
| intel | xeon_e7-8894_v4_firmware | - | |
| intel | xeon_e7-8894_v4 | - | |
| intel | xeon_e7-8893_v4_firmware | - | |
| intel | xeon_e7-8893_v4 | - | |
| intel | xeon_e7-8891_v4_firmware | - | |
| intel | xeon_e7-8891_v4 | - | |
| intel | xeon_e7-8890_v4_firmware | - | |
| intel | xeon_e7-8890_v4 | - | |
| intel | xeon_e7-8880_v4_firmware | - | |
| intel | xeon_e7-8880_v4 | - | |
| intel | xeon_e7-8870_v4_firmware | - | |
| intel | xeon_e7-8870_v4 | - | |
| intel | xeon_e7-8867_v4_firmware | - | |
| intel | xeon_e7-8867_v4 | - | |
| intel | xeon_e7-8860_v4_firmware | - | |
| intel | xeon_e7-8860_v4 | - | |
| intel | xeon_e7-4850_v4_firmware | - | |
| intel | xeon_e7-4850_v4 | - | |
| intel | xeon_e7-4830_v4_firmware | - | |
| intel | xeon_e7-4830_v4 | - | |
| intel | xeon_e7-4820_v4_firmware | - | |
| intel | xeon_e7-4820_v4 | - | |
| intel | xeon_e7-4809_v4_firmware | - | |
| intel | xeon_e7-4809_v4 | - | |
| intel | atom_c3308_firmware | - | |
| intel | atom_c3308 | - | |
| intel | atom_c3336_firmware | - | |
| intel | atom_c3336 | - | |
| intel | atom_c3338_firmware | - | |
| intel | atom_c3338 | - | |
| intel | atom_c3508_firmware | - | |
| intel | atom_c3508 | - | |
| intel | atom_c3538_firmware | - | |
| intel | atom_c3538 | - | |
| intel | atom_c3558_firmware | - | |
| intel | atom_c3558 | - | |
| intel | atom_c3708_firmware | - | |
| intel | atom_c3708 | - | |
| intel | atom_c3750_firmware | - | |
| intel | atom_c3750 | - | |
| intel | atom_c3758_firmware | - | |
| intel | atom_c3758 | - | |
| intel | atom_c3808_firmware | - | |
| intel | atom_c3808 | - | |
| intel | atom_c3850_firmware | - | |
| intel | atom_c3850 | - | |
| intel | atom_c3858_firmware | - | |
| intel | atom_c3858 | - | |
| intel | atom_c3830_firmware | - | |
| intel | atom_c3830 | - | |
| intel | atom_c3950_firmware | - | |
| intel | atom_c3950 | - | |
| intel | atom_c3955_firmware | - | |
| intel | atom_c3955 | - | |
| intel | atom_c3958_firmware | - | |
| intel | atom_c3958 | - | |
| intel | atom_c2758_firmware | - | |
| intel | atom_c2758 | - | |
| intel | atom_c2738_firmware | - | |
| intel | atom_c2738 | - | |
| intel | atom_c2718_firmware | - | |
| intel | atom_c2718 | - | |
| intel | atom_c2558_firmware | - | |
| intel | atom_c2558 | - | |
| intel | atom_c2538_firmware | - | |
| intel | atom_c2538 | - | |
| intel | atom_c2518_firmware | - | |
| intel | atom_c2518 | - | |
| intel | atom_c2508_firmware | - | |
| intel | atom_c2508 | - | |
| intel | atom_c2358_firmware | - | |
| intel | atom_c2358 | - | |
| intel | atom_c2338_firmware | - | |
| intel | atom_c2338 | - | |
| intel | atom_c2308_firmware | - | |
| intel | atom_c2308 | - | |
| intel | atom_c2750_firmware | - | |
| intel | atom_c2750 | - | |
| intel | atom_c2730_firmware | - | |
| intel | atom_c2730 | - | |
| intel | atom_c2550_firmware | - | |
| intel | atom_c2550 | - | |
| intel | atom_c2530_firmware | - | |
| intel | atom_c2530 | - | |
| intel | atom_c2516_firmware | - | |
| intel | atom_c2516 | - | |
| intel | atom_c2350_firmware | - | |
| intel | atom_c2350 | - | |
| intel | atom_c2316_firmware | - | |
| intel | atom_c2316 | - | |
| hpe | apollo_4200_gen10_server_firmware | * | |
| hpe | apollo_4200_gen10_server | - | |
| hpe | proliant_bl460c_gen10_server_blade_firmware | * | |
| hpe | proliant_bl460c_gen10_server_blade | - | |
| hpe | proliant_dl580_gen10_server_firmware | * | |
| hpe | proliant_dl580_gen10_server | - | |
| hpe | proliant_dl560_gen10_server_firmware | * | |
| hpe | proliant_dl560_gen10_server | - | |
| hpe | proliant_dl380_gen10_server_firmware | * | |
| hpe | proliant_dl380_gen10_server | - | |
| hpe | proliant_dl360_gen10_server_firmware | * | |
| hpe | proliant_dl360_gen10_server | - | |
| hpe | proliant_dl180_gen10_server_firmware | * | |
| hpe | proliant_dl180_gen10_server | - | |
| hpe | proliant_dl160_gen10_server_firmware | * | |
| hpe | proliant_dl160_gen10_server | - | |
| hpe | proliant_dl120_gen10_server_firmware | * | |
| hpe | proliant_dl120_gen10_server | - | |
| hpe | proliant_ml350_gen10_server_firmware | * | |
| hpe | proliant_ml350_gen10_server | - | |
| hpe | proliant_ml110_gen10_server_firmware | * | |
| hpe | proliant_ml110_gen10_server | - | |
| hpe | proliant_xl450_gen10_server_firmware | * | |
| hpe | proliant_xl450_gen10_server | - | |
| hpe | proliant_xl270d_gen10_server_firmware | * | |
| hpe | proliant_xl270d_gen10_server | - | |
| hpe | proliant_xl230k_gen10_server_firmware | * | |
| hpe | proliant_xl230k_gen10_server | - | |
| hpe | proliant_xl190r_gen10_server_firmware | * | |
| hpe | proliant_xl190r_gen10_server | - | |
| hpe | proliant_xl170r_gen10_server_firmware | * | |
| hpe | proliant_xl170r_gen10_server | - | |
| hpe | proliant_e910_server_blade_firmware | * | |
| hpe | proliant_e910_server_blade | - | |
| hpe | synergy_660_gen10_compute_module_firmware | * | |
| hpe | synergy_660_gen10_compute_module | - | |
| hpe | synergy_480_gen10_compute_module_firmware | * | |
| hpe | synergy_480_gen10_compute_module | - | |
| hpe | proliant_bl660c_gen9_server_firmware | * | |
| hpe | proliant_bl660c_gen9_server | - | |
| hpe | proliant_bl460c_gen9_server_blade_firmware | * | |
| hpe | proliant_bl460c_gen9_server_blade | - | |
| hpe | proliant_dl580_gen9_server_firmware | * | |
| hpe | proliant_dl580_gen9_server | - | |
| hpe | proliant_dl560_gen9_server_firmware | * | |
| hpe | proliant_dl560_gen9_server | - | |
| hpe | proliant_dl380_gen9_server_firmware | * | |
| hpe | proliant_dl380_gen9_server | - | |
| hpe | proliant_dl360_gen9_server_firmware | * | |
| hpe | proliant_dl360_gen9_server | - | |
| hpe | proliant_dl180_gen9_server_firmware | * | |
| hpe | proliant_dl180_gen9_server | - | |
| hpe | proliant_dl160_gen9_server_firmware | * | |
| hpe | proliant_dl160_gen9_server | - | |
| hpe | proliant_dl120_gen9_server_firmware | * | |
| hpe | proliant_dl120_gen9_server | - | |
| hpe | proliant_dl80_gen9_server_firmware | * | |
| hpe | proliant_dl80_gen9_server | - | |
| hpe | proliant_dl60_gen9_server_firmware | * | |
| hpe | proliant_dl60_gen9_server | - | |
| hpe | proliant_xl730f_gen9_server_firmware | * | |
| hpe | proliant_xl730f_gen9_server | - | |
| hpe | proliant_xl450_gen9_server_firmware | * | |
| hpe | proliant_xl450_gen9_server | - | |
| hpe | proliant_xl250a_gen9_server_firmware | * | |
| hpe | proliant_xl250a_gen9_server | - | |
| hpe | proliant_xl230a_gen9_server_firmware | * | |
| hpe | proliant_xl230a_gen9_server | - | |
| hpe | proliant_xl190r_gen9_server_firmware | * | |
| hpe | proliant_xl190r_gen9_server | - | |
| hpe | proliant_xl170r_gen9_server_firmware | * | |
| hpe | proliant_xl170r_gen9_server | - | |
| hpe | synergy_680_gen9_compute_module_firmware | * | |
| hpe | synergy_680_gen9_compute_module | - | |
| hpe | synergy_620_gen9_compute_module_firmware | * | |
| hpe | synergy_620_gen9_compute_module | - | |
| hpe | synergy_480_gen9_compute_module_firmware | * | |
| hpe | synergy_480_gen9_compute_module | - | |
| hpe | proliant_ml150_gen9_server_firmware | * | |
| hpe | proliant_ml150_gen9_server | - | |
| hpe | proliant_ml110_gen9_server_firmware | * | |
| hpe | proliant_ml110_gen9_server | - | |
| hpe | apollo_4200_gen9_server_firmware | * | |
| hpe | apollo_4200_gen9_server | - | |
| hpe | proliant_ml350_gen9_server_firmware | * | |
| hpe | proliant_ml350_gen9_server | - | |
| hpe | proliant_ws460c_gen9_graphics_server_blade_firmware | * | |
| hpe | proliant_ws460c_gen9_graphics_server_blade | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "823AD74E-785B-40C9-BA27-F988F5006263",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "433CEBA3-2B72-404D-B561-957CEAC0A5B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D076A4C-EBFF-47CD-898C-E3D8595897DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C35F1845-F913-43E2-AA05-F64FD0A6A736",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D9A1F6-A5BF-4456-9908-A767CF2FF866",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11562A6B-26CD-40A6-9184-7CA128E1F017",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3829529-3EC5-4681-8902-AA581D9C2DDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7F2F3C4-28A2-4C3B-9136-B222797FCB0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C6506-97AA-4E82-9678-E98C58D3F4CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C950976-266D-4258-86CB-8987C093331F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10B8978A-6621-41F4-AEAC-27B3FC5029B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3219701A-8CF0-4307-A957-1E31F6A5C195",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7F4E55-3AA3-40EC-8686-719F8474B3B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BA9357-FDCE-4FE2-ACC1-065E6C0C6994",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5D6779-B826-418F-812B-D1AD926E2D7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDEBFCA-2B4B-4C56-80BF-E14704149F9B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
"matchCriteriaId": "713D5096-EF81-4B61-963D-63B56C03AE68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BEA9978-20AA-4224-A22C-5F0D392A6E1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D89A5F91-2F18-49FA-82B4-0437414751F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BFDF125-D5BD-40A6-8958-68C8F93C913F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D43F33-6733-49BE-87B2-14936230E5C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80DDA8F-A66E-4E20-BA6F-BEDA18CFE711",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39A299B1-2DB1-4388-8369-6C70BDCC5D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0986CB70-7825-4AF9-9358-9698D7F40492",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
"matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE3CED4-BD1B-4B3D-817D-F49F19822EB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "953C818E-B5FB-414C-94C8-E8372A55F610",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4B7AD9-452D-4C53-8785-6B06E3009894",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3A6E6D-FC3F-4218-918C-4571EBD6513D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82A4157F-D890-4FC7-8415-A41C0CDEE8C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E39C9D8-2CD3-4536-8ED0-866D4C7A20F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04304600-5379-4B6F-9FCC-B77AFFB17B91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E97DDE9-A40D-4A94-9789-56B481F81C6C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD440FF2-14BA-40D3-A05B-09211729CD3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23AF1DF3-4044-47E7-9904-19CE0C9C5F2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67B0B7EA-DBC1-4E02-A33E-7180FAB684F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07C007-095A-4C11-A663-E38D624690D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "215608D2-0F48-4E32-963A-2DFE74A84557",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C0E2164-CFCA-4236-A6AD-74484E387639",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AEC407A-5450-468F-B0CB-3028FF92468F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B880E026-665A-4519-87D4-4DCA08977033",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24EEECD1-018A-47FB-8CDA-6786864994B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "761A4FF6-04FA-4DF4-AD51-58DA0211BA1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "262ED175-6056-4FD6-840C-F4523A96677D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19C76503-5F56-4C2B-8973-A3F94B1345DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A6461C-C6F0-4A65-A86E-4420B1ACE6DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D544957-C9D8-4AC1-A7DE-7E6FE000E2E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "352D121E-69C0-470E-AE02-8413DCBE1DC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D02F2-46A7-4359-94BC-7AE15EDE692D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A19FF1B1-F380-4CE7-8C09-DEFF7ED86571",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AF2819-C873-41A9-94F5-B8B34EBC9633",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D162F8D-5836-4B52-A98B-EFB0289C1346",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C5FB6D-C652-4743-84F0-D7BB55F2733F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685FCDB3-F3FF-49C0-A26D-BFC081F2B78D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E317001-0126-4B64-85AE-04AEC9954085",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B51741B-1976-4998-B5DC-5AE1D62F6864",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3943BF-B43A-4077-B75D-EBE27C3D6A17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E231B13-FC1B-41E3-A47D-4F0FC4F37B33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "728C0EE8-D4D9-4426-9709-46505AF901D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54686C14-25E6-4B4B-8ABA-FB115F6DDC3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "938EF635-E09B-448B-A446-48890A209878",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "641570F3-6C32-40C6-8486-626FD4899B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADE3148E-2DCE-4CA9-ABE3-43779D06DD42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC462EF-264D-4365-A965-0BCE9C687496",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5AB911F-8825-4C97-9454-4F5DC5396E2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2411CF40-9A5F-4138-9111-84087A30050F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8141C47E-4F0B-498E-8B18-264E90448C3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB40F57-7944-48CE-AFC6-9531D1E6B71C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA876028-4021-4B58-94C2-89CEBD9CBA23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB7EA5C-D048-4130-83D9-497A1769C851",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4226119-3BCB-4523-BD2E-21BC9C4F2217",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7682FD90-727B-4190-B053-29E29660E397",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0D73FF-6831-4332-B720-DADD9A53C22D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07BB4987-AB65-4054-8528-3C32DEF61540",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13FD9772-975A-48D1-83DF-713F60B5F501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7137FDAC-D47E-4AB6-B7AE-3EA90AFED052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "596D1638-076D-4A57-AB79-22278085CBCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD21434-492F-4657-BEAC-9377ECE62B0A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89565573-AEFF-48C3-BC84-C377C32D4714",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7C0152-876E-4380-A0CA-B0FE79A3EB63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32DCC33-F4C0-449F-9CBB-F9F9895DA684",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FCC5DE-7BFB-4DF9-BB3E-C86AD99360EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A3F4C12-F26B-4BF5-9A4E-125ACC1F9A6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A659499-6C74-49B6-8EFA-AA93E818BC4D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17073B15-57FF-4B06-ACB5-8E51715D20D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D633D7-4CE8-4378-AA86-2FC518705725",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCC81D7-E2EA-439C-9844-3C35C83549FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD67CFA-4E44-45FF-ADCA-DE178FA8D8CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
"matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4DA774-A3D3-4171-B733-42DB8E5D47EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A3CABE-9C4E-4EE5-A2FC-5CDA47893D5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80C54E18-D1A2-4651-9F52-F7846121D4F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2C89DC-2DD0-4F8F-B7F2-A102419D1D1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2B805F-F692-4B71-942A-65BF2AF78FB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE58040F-EE13-4EB5-92B8-7A25595DEA62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDD3F0B-F99F-4D28-98FF-5051E8841638",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63FA88FF-EE13-4B3B-BA06-EDDD5392DF5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2478D053-2E0A-4962-A38D-A05DA6A75D71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "189B8D49-563A-41FA-9849-C0C10678721F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "644C5C4C-4257-4B9F-BE0C-01271B7BE6BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4784CBB2-276A-4742-92F6-0B5A35818B7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE33A02E-5A74-4F9B-BEBE-657F311C0387",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0E4832-F8E5-4718-9358-C2E12049B771",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD96F46-FB80-4E43-802B-2918F8650E3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4E951A-EFE0-4976-BB67-B3996594C8D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEABF4C-68FE-4F14-B19B-0021312264E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3B2FF7-F02F-4FE5-8585-1B242D06CF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F946544A-D4CC-4758-8B26-4FC2AD944F01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A24929-1F33-4AFE-B80B-8F9DCFA141B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8A78D4-3FAC-42C0-8E10-7D4793AEF338",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B774A43F-3EF6-46EE-9909-51A273471FFD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B66C7A1-46DC-417F-A1F0-05CFF95E8C83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F371BC-529E-4787-ABE6-BE7BD937B04F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD77A673-DD3B-431A-ABA6-F00E220819B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E477BD27-BD2C-43BB-9637-2A866575637A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "786C8BA5-A74D-46FD-8241-12934B6C26B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "394270FA-3A62-4778-9E38-70CF88B430DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A905368-740B-48FB-8949-D212D637E5E5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A0297E3-3D66-4174-97EE-832F5E1DC708",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D72C6B-6F57-4D37-9363-E741E2931B8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B94CF0F-0A7B-42D1-90AF-28A893DA85D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAC3989-A0CA-465A-9DB9-3C29D617C8AE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37012AFD-094E-4742-972F-AEEDDEE4105C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9976EF5C-1AFA-4FED-8248-B6638D75743A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A869936B-3C49-4E13-A467-28CBA4178F40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2577C819-3541-4AF5-87C1-C5ABA32AA709",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "712B36F5-6217-48BE-BA59-55F4AD9EACDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C57B1AE-7C36-4991-9835-8BA292598B51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5872F0A-E0E2-419A-91B4-7A57268CCB25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5F33C5-18B0-43B4-A478-DB0478019E6D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF024983-AAB6-4A1B-BB04-DA015D59F9DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "540F4FFD-174C-4183-B208-9F7BA81E10A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4D8719-A1B6-4641-9116-B3530AE77DEA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3B14F2-3FE9-4435-A463-55C0DDF867B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F54775F7-3AFF-4675-A686-A2EC357FEB85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF812F0E-DC8B-404D-ACE3-EA55FA189615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2F3B48-F432-473C-B7AA-881350F4ABC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "243FB5C6-FA42-4148-AA32-8DA43D2A1669",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63259ADB-12AC-43B8-8399-0AD7A4CCF31C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104244E0-C4D7-46A7-999C-07180274E8D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2DE391-0FFA-4F9E-8349-6E41267F74C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B053DE-AF7F-4A0F-A78D-72AE6E144761",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "124DF9B2-F703-42BF-9737-1777A51D05D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84877243-152D-4E02-A18E-850BE2755CF2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C3809F-F701-4969-A27A-294D0ACB9CF7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A699BC14-5C2C-4B5F-8863-C9188159399C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C77023B4-99B8-4C36-B384-68445D28783E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "942E5B7A-FC4E-4645-9D66-44BD3D46A1F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8104B9-EA92-4AFB-829A-35FDF9E1FE4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "897A798F-BBA4-4412-849E-E8055C310338",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C96C9EBB-4585-425D-81CC-9A2B0C1CF9BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395D579-1812-4F1B-A3F1-B38CDA7ADBD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "160A9F6E-18A6-4181-A63C-5F8A13985869",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EECBA2DA-44F9-4393-BD50-A13AFFC4CA06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A55CAE1-0334-469F-9230-35D607A42DA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E541F97-BE7B-433A-A073-F0DC2551D95D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC478F61-883E-46BB-A4F9-5833A6DDE6C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99160243-440E-44F5-A36C-C9507823E9AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1420874-49D0-4E69-BD67-26E6C9FC873E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23278D55-861D-4BED-A378-E5AC28D64E26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC5D11E3-FEDE-4453-B89D-78505BD03326",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AACF7B5-E2B4-4F05-827E-7DC74FC0BFD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD7C804C-BFAA-4886-9621-C255F2F867B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77FEA398-7001-4FF3-89F5-FE6709FDDD76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19A506EE-01BE-41E1-BDC9-67CA676B8638",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B22D1E-6EDE-4E13-8B52-E532A548B522",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2A5EA2-10A9-4C53-BD0E-1026D5F51B6E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12142C64-3833-4422-AF21-4C6D3489B2FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF717C4-6E91-4A86-87E4-D97F70E0936E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "768DA6C1-6491-4197-94C9-9B9EFC46B1D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE60C16D-B9F7-4EAA-B240-92202B11F6A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60BF382C-DF60-492F-B119-8659929079F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B83717-B20B-4EF9-9750-5C628DE8DA6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87B2CBF6-53F4-4603-B96A-795E06F903E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "953C8F85-28B4-4458-A4F0-2D55336FE34C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "628DC30A-538E-4A38-9AB9-6C6EF1224E46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A3A2F8-3908-4083-AB72-301A825FBD1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "568E0211-9975-4C64-AE69-22BF38145889",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD63CDF0-0EF3-4370-9F9D-FE3DF07E39AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1AC5A5-F7B7-4FD1-B598-A8D074690DDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C830F688-BCE6-4A86-9C58-DB34505EC366",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47EE4C7B-FFBA-4BC2-A0B0-BD7DD28105F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE67577F-3B63-4995-9E51-19647F4EBB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA569BAD-9592-4D0F-9522-CB1C05D830C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A081C35C-0D19-4025-AFDE-C3E4C4462124",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4209A314-97AE-467E-B9A7-21CD5FE531C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DAE24C-19F7-46CF-AC3F-E38066FCE0CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D04C6752-81A8-4828-8865-8977C0343635",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7571BE1-C7C8-4FA4-81B3-9F0F7BED5840",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13B2A639-66B6-473F-A505-4ACC70D283D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC3D549-9EF3-436A-B672-693CB1D5C14B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFFA1F0-B260-4534-893A-D85546D198BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9203112A-2E5C-4EF5-B34F-74E66838BE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8470B7D3-384E-4E14-9E22-EF867E99B39C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA406873-E126-402A-BBD8-46BC22AC4756",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89023F97-9135-434E-A078-D1337401634C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F826234A-2C49-4E02-B586-5CD038A90799",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "461C01B3-31DE-49ED-8DEB-C5A4F75276B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A738A2D0-FF0B-4E75-90F7-E0E39D937C5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CAA3389-2F0A-4CDB-9A9F-AB11314192DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E995666-F7F9-42AB-83DA-AE4202B59A90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EACDE0A-40CC-43F4-B636-44AEE2F7DB71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "963AD924-07BB-4E68-B817-AC2A82A5C7C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32C775C-5470-4C35-BC9C-5660B71354F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396B0F7F-3BF1-49BF-9304-285049FBA318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD73511B-5C0F-4ABE-B9AB-96756CF135CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3833A360-9D9E-4CFE-9CAC-DC9F0CDA0C52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7602F46C-4BC8-4826-8C2A-CAC75CF588C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "284FF890-627A-4FAC-A8F4-A9B44E3DA397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D941351-4BEC-40A0-9B17-6D5544B9C97E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72781DBF-E6D4-4BDB-BD6E-9B86EB0224A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1089B3DC-934A-4A76-92CA-CACF68DDDDB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "209DE5F9-D191-4720-A53E-1F39BC6567DC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB4F7078-8C0C-4690-AD8B-36EC49B6145F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A28FD72F-F1CF-4076-9523-E355C20CEED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B14CB7-E892-400E-B795-60207B554EAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F4E301-BF06-44E1-8F15-37FF5B31CB19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8C5BBE-2911-4F56-B48F-B076CD3BF748",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC204334-6964-4DCA-A62B-BB71FFA5D4EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4328D1DB-7F30-4CA9-ACA9-460E14FE20D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522F7CBA-7480-43D8-A31A-B52872600ED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFED5267-3BA8-4B62-9F18-4ACEE09BF9DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A85ED1D-D2B1-46FB-90A4-0B47EB1EED8E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D45C3021-428A-470F-9D38-242E2BC03CA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB17C45E-9401-4A21-B537-0432744403AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "525FC69B-A75F-48CD-A46E-1872E8A138D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E1EECC4-C82D-4871-A554-61A15A496E90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604284C3-8B21-41B6-A5CE-DE1A9B02E476",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3380FA20-4FEB-4F6D-A86D-A3BF81E8F8D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04B80E35-9D85-4844-8573-37F292FAE300",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5AB45CA-5D82-4204-8274-7B0CD0B5C852",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF48C5B-5291-413F-96BB-40A9C2558832",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "113A641C-D291-4BE5-9643-21BA1FB04101",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC66FCE-6577-4E79-81D3-C718D1B343E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8390A9-863C-4687-BEDA-64768191E7C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD6D487-A6AA-4752-9CC4-07065F42F043",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D830FF1B-05A2-47C3-9AA0-06F75F0CF01C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "240D24BD-A84A-4562-B850-56EB9A47507F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3199C4-C5BA-4FC8-9539-21A6C3C85336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867D3D4D-D8A4-45C5-9F06-B51989C7151E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C950AF-E109-41ED-8A3D-F7151216F01F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6DBE50-7BCF-4A81-88CE-113716482740",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5B57D26-455B-48D4-BB27-6A8D84C8D5D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD6BE85-75C2-4C74-BF7C-9B9E34D4BABB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D355937-EE3A-4FE0-B3CB-5B7E19ADE4FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF81E50-8089-4C58-B532-66D482D05E52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97AA9A3F-9ADA-46B6-8CEE-A46564953699",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FE58D0-969D-41E1-802E-39672064AE26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FECF753-354D-40EF-8063-FF93C7FA8B86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9C8551-D17B-49F4-A3BD-DD393729EA74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376E792F-A029-40B1-83B6-A0C2F40F4B1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77568036-9AFC-47CA-99A4-04C2100CEA2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E18B9E2-0659-4A50-88F6-D3D429EC5F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C093E8E-3E90-44EE-85E0-B76AD459FFD0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158C116D-5E24-4593-A283-F6810E424B5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "708714CC-47E3-422F-A5F6-41EF514C6138",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE5F25C-8092-4A74-B265-4BB720DA1A4B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10B02B3B-1E22-4BEA-935A-77399C74D7BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A33FC1CB-7983-48B9-AF3C-E3CF958B5FA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A3605E5-1F1D-493C-AB6B-5FB05FDF112B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF500096-2B4A-476B-BBCA-1FEE100ABC91",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9506C1-77E3-42D0-A3AC-0EA3DA33D858",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F17C3AB-AC03-427F-B0A9-9EACD2A231C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7750BF9E-2E56-4583-987F-F43D5AC15947",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4058BBB2-268F-47E6-BE5A-992C5F460BC6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A2220F-DE01-4A0E-8A1E-670443FCE6BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F191949-2674-4968-90CC-030D6E8901D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FCF369C-7514-46A1-B20B-769916ADA521",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6893581C-5447-4FAD-BFCB-41727FAB4CF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637B704A-C853-4932-91E8-48DBC1C8A66A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42737F96-25B8-4E3E-AED2-47FA27075A23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2F70FF-B0A0-4B69-BC03-954FCFDA0480",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65F731F9-59EB-4161-AB8B-506BC336B987",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5541BEF0-105A-4FF8-AB7F-34F5A15D5C65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F35B073-EA5F-4746-AB8B-674C9EAFDC3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD4B2C83-ED19-47C9-951F-627E26084286",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D397ED37-60EE-49F0-95F0-2C6F666E9368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83956A37-ABB6-49C9-983C-4B992BF1ADE9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA6C3DB-8E6D-4CF8-BD52-B362C83DF4A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C413496-47F4-4A84-8413-B0E641822E03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6107B3F-C7FE-46EF-A80E-1A4DD55F9306",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B07AAD3D-D2AD-4B67-B80D-965E89E0C79B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E7FA68-B62B-4EEF-B8EA-665026E1E3F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA3DA22-BFBC-427E-A772-446F14C85534",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC9697A-CEA6-4C64-A380-967BCC5357F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3753F3-4138-489D-AEBF-20C3936366F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32BD8BB7-511D-4C69-9907-07E22FBA7D1B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E5F87A-4190-4C8B-B801-E74F4BFB6DC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC269811-A0BD-4D3A-9741-369D4B8BFCBD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3DCA3F7-6E89-4786-B683-369E0976E2BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE48983-8F99-494B-9860-5664EFEB6C45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A21E64A1-71EB-4015-9496-A220C7DDAF12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1A1967-CEF9-47F8-B02C-1F4FBE78286C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C878C4EB-3A07-4944-A24D-A0D67A159694",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99C8C823-2A89-49B5-8E21-02C5D881D2B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67D01577-A8CC-4F59-8F76-EDFD3EF9E986",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D320EDF-E62E-4555-8D08-00D9BD2A1F26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A577E3B-DEC3-4FE4-8D96-27ECE666172C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAC05EA-AA3B-4BD2-8FE2-6B3963BC39C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C290D7AC-D9C3-478D-B61F-8F54036A6DA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E988520D-BABE-40DF-A441-25A8BC2B3268",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB77496-F7A7-494E-9E51-24901741BFEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75724C74-9495-4EEC-8A40-7808CCE3D29A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1063DE44-0789-4059-B40F-48A55545E660",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59CD7DDA-6DDA-47CF-9A75-AFA75B02A56F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED01CE89-71D4-4F6B-8439-E693CCD978C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9DD816-EF8D-41C7-B015-870ECBD1DEC8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42791E03-655B-4191-BBBA-0055C12649EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD74B036-6637-411E-9898-518CB526A1D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9BEE43-BD62-44A6-836C-65FA94405F73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E82535A-02C5-4AFC-81C4-9CFBBF9ACB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E56B401-3205-45F1-AA32-FFE6330C82CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C22B03-1C16-4464-BDBF-8A3BBA5D52D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D81E9C2E-FC79-43CC-9780-F533EE1880E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50DC14BE-0C3B-426E-9203-434B89120676",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC79478-5CC7-4343-B30D-D2C9A2B95782",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7377FC51-D3E6-4483-A318-5609F0190E2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "110A5A96-39F0-4DE6-9CA2-9C090BE2EEE7",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76BF98B8-E64F-4426-A596-758BD6F08A8C",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9ECC00-9156-4BCC-BE83-C5B95F08B622",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78F8508E-6E46-4F9E-91F9-EBEA8CB5F80D",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA58491-88B5-46E1-8445-BBD202D08BED",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3D52E0F-CC78-4C2C-82EE-FD417E931C1C",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6148FC-AC08-4792-927C-525EFCD8DE33",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10003012-8FA4-4AE6-B53A-08E243103A47",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C47996BA-45A3-4E2A-8363-7534F410B8C3",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7EFAF70-6058-4183-A9EB-758A3A2BB5F4",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAF8588F-FC95-4BA5-86A6-1A9D467A12EC",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71F6C5FF-5707-40C2-A6FB-294A4B2286EC",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51F295E-F02E-42C0-A41F-2FC06DEC6369",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FDE404-A629-4B74-BD3A-1265615574B1",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E678777-11D5-4AC2-9234-486067845D9B",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01AC298E-62B7-4174-A95C-94A86310AE7C",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2AD39B0-92C1-4320-B747-3F6196E685EE",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
"matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB00E6B6-C3F6-47DB-A3BD-64DA4A537888",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "139B10CE-1A41-44B7-9005-E69ABAF6AF6C",
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81C0D163-8BF3-479D-8D39-ADB5EE83E413",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E685C0-E20A-4E95-A76F-8D18AF92C0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B28A6A-B054-4B29-8A89-4D89DCFDC68C",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D230E7A-D852-4040-83CF-164AA3233F00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8992B556-450E-4B84-B940-530B1B488DFD",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EB6796-FE83-42EB-84FF-F405289EE0B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B49CBF4-305A-4095-89D8-91A3DCDFCCE8",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2068295-B73A-4C01-8351-C2D8B957845B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21562984-FCDC-4FFE-9353-44663C1B3C7A",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F6D2D0-482F-4B2F-AF78-82BC56704E8E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B451FC3-D364-494A-A1B2-4A35727E1B8D",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34A65EC0-14C7-4838-913D-8EF11144A85B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51C71ED8-B629-493C-A84F-36F778E3E582",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E4F18F-55E2-4829-A1EF-881D06CC5481",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "998F5EFD-091F-4FBE-8223-142A6A83DDC6",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AD90B1-F95C-4A74-AAD5-684C0E0DCBC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F2383A-A686-4D99-90AA-853424468825",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B65F98-15A8-48FA-A836-97430AF183EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20E83560-BD97-4E15-B77A-D0DEC53788D9",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF640F8-B432-40DA-93C8-77D8351CB390",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B44100F9-F1FC-444B-A2F4-05C434B7F1C3",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4F7E5C6-201B-4268-9CA7-13BBA1E74DF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF3F03B-9A81-482C-97B6-8FC707ADA1A9",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C838C36-FFF2-4C90-8BF1-21984D6C9C88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98FED1-7EB6-4FDD-9369-CE2888F698C1",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CEE8B85-1F21-418F-B2D3-90151F6423BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A93DFA25-ED4C-42E4-9D51-2C5ECE96C6CC",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E62FEEB-A62D-42F4-A713-4CEAFF9B158E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "653154AC-2149-4A59-B8A1-EDADA0072365",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA80708D-3219-4D54-B167-105DDEC5B85D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF8640F-CD4B-45D3-A58A-DCF9179BC1B2",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BA2C97-7AAB-4A55-B487-522715BDC80C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00A9B50-7CA1-42E1-9AC0-6AA19692842D",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58AE85AC-1062-42E2-8142-9BC754D51035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "254CC1CC-2D1B-4A87-A634-D4A16DBD62C9",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBAD3B0-D47D-4E05-96D1-28A989E118CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8099719-2DE8-44DE-91BA-2A00E6FAE7A5",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "789F7158-51DE-4344-BD8A-1249BFE0158B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D10F86F-26A9-4E9D-9264-12E52A4E3C3C",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29BE9486-493D-495E-8CFA-1E79FE57457C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB5522-5C69-4D44-B74C-4C4C87CE0450",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2703B986-0709-4D89-8CAF-7C3FB63D7D3F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30B25ADF-E58E-4553-B8F0-80A438DF9240",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3268D0-1F66-47BA-972C-21E809DC2F2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1E89C3-3DC3-4AF2-BAB2-7FD187BB28C7",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C20D38E9-B2EA-4ECC-B9EC-D29BB249AC77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42F5768D-2F77-4A58-8558-D2D95D8CA0A4",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB05A81-BDF5-4D6C-B9E3-1894703F1CC3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E4AF56-8B36-43B9-A5BE-BAC7A40A8956",
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66E10A5D-7C64-460A-9DBE-E5BCBBFDE6C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access."
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n de entrada insuficiente en el firmware del sistema para Intel\u00ae Xeon\u00ae Scalable Processors, Intel\u00ae Xeon\u00ae Processors D Family, Intel\u00ae Xeon\u00ae Processors E5 v4 Family, Intel\u00ae Xeon\u00ae Processors E7 v4 Family y Intel\u00ae Atom\u00ae processor C Series, puede habilitar a un usuario privilegiado para permitir una escalada de privilegios, una denegaci\u00f3n de servicio y/o una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local."
}
],
"id": "CVE-2019-11137",
"lastModified": "2024-11-21T04:20:36.350",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-14T17:15:13.270",
"references": [
{
"source": "secure@intel.com",
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2019-11137
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2019-11137",
"description": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.",
"id": "GSD-2019-11137"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-11137"
],
"details": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.",
"id": "GSD-2019-11137",
"modified": "2023-12-13T01:24:02.624291Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-11137",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 UEFI",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service, Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"name": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.20",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.76",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-11137"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03967en_us"
},
{
"name": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.f5.com/csp/article/K56215245?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
},
"lastModifiedDate": "2019-11-22T09:15Z",
"publishedDate": "2019-11-14T17:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.