Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-26336 (GCVE-0-2021-26336)
Vulnerability from cvelistv5 – Published: 2021-11-16 18:04 – Updated: 2024-09-16 17:33
VLAI?
EPSS
Summary
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
Severity ?
No CVSS data available.
CWE
- tbd
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://www.amd.com/en/corporate/product-security… | x_refsource_MISC |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| AMD | Ryzen™ Series |
Affected:
various
|
|
| AMD | Athlon™ Series |
Affected:
various
|
Date Public ?
2022-05-10 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:23.912Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Ryzen\u2122 Series",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"product": "Athlon\u2122 Series",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2022-05-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "tbd",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-12T17:44:49.000Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"source": {
"advisory": "AMD-SB-1027",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
"ID": "CVE-2021-26336",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ryzen\u2122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
},
{
"product_name": "Athlon\u2122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tbd"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
},
"source": {
"advisory": "AMD-SB-1027",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26336",
"datePublished": "2021-11-16T18:04:08.054Z",
"dateReserved": "2021-01-29T00:00:00.000Z",
"dateUpdated": "2024-09-16T17:33:06.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-26336",
"date": "2026-05-19",
"epss": "0.00126",
"percentile": "0.31305"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"85F21749-D015-4195-BCF5-0EC546559090\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"E55A8C48-979D-4824-BCCB-D3C6FE1BAECD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9A05BAA-D9ED-411D-AEC7-DBD8998C345E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"2C7CAA93-4553-4EE7-8DED-4E607F62DAF8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"C793CE0D-A5D2-4279-8A2E-056C0E34DCD3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"C951EB53-A85E-4AC3-8076-167AD244B605\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"AA050CB2-9587-4534-A766-D434ED2BA2BA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"B09197BA-5C2D-4616-BADF-A6D2FE9FB044\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"678C5F58-8AE9-46FF-8F01-4CF394C87A2C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"AC530984-C23F-4C2A-B07A-689C69C08EC4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"1271AB1A-2AD6-4837-801F-53B25724AD06\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"7596F9F6-7216-4A6C-A1A4-02F1719A5506\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"241E39FF-FE66-444C-A4C2-3D28C45341BE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"01FE866B-C654-4A7A-B65A-A3BEFA896D87\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D08121-DC57-47D7-8214-23A209F0AF08\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"0655082D-02E4-4708-B749-F035E87A3CCA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8264DF4-47B4-4716-AE89-44AFA870D385\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"30CDB8F3-A757-449B-A66E-3F0E443E6001\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52544912-FAA3-4025-A5FD-151B21CEC53B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"8F375A23-E6B5-4998-960D-764AE7F2E202\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"1DD8F2DC-5263-4FDF-B13A-70A4D15361A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"FA78545E-FDD6-49DA-8DDD-F1FB504EC59A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"FD918198-F9C6-41B3-A338-F64DEBCC017C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"milanpi-sp3_1.0.0.4\", \"matchCriteriaId\": \"89BE6D92-D0B1-4092-ACB7-DE987FC026B5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"0DBC6D60-29B4-4A9C-B991-D8968A218F20\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16D55BEF-AFC8-45DC-9401-5DEF374E16C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"57089BAE-679F-473F-9737-E7122BFC48F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"145D27E6-850A-49AA-AAB3-B432151A41D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"85EF80C4-99FA-4662-867A-9E4B766D3CB9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F187412-26C2-4D8C-9199-D7CCF49D6520\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"483A580F-1308-4898-B995-2D5DFB445205\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FC5683-F612-4586-8BA3-FB1F66D8868B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"EA3612A0-938A-4148-9008-A4267D7C5B98\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"F77A628F-9D88-4868-996D-D44AAD8E1D85\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"289C6D4D-8BC6-4DE3-8355-13AC1940F9EE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"5EE9574E-39B8-4FEE-B560-20BA5019F4CE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"430C9955-0090-4166-8E90-D81C2AA7DE0D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"3A1964EC-9D00-4399-8C9C-469EB7195039\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"B2F07874-0B84-4321-B5A2-BD655F001FEF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49BBC687-5C3C-4843-A028-B8BE29D1E302\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"58DA87AB-FA43-4C46-96DC-B6A117722A8E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"563708A3-7C51-4693-B02D-9A25A639FE42\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"08A5A80E-1468-4F29-BD8E-65E8B1998B17\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"BBAC3939-49D7-4338-A138-17987C0EB577\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"E9580EB1-B700-40C9-92F7-0C7F0A31321D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"7132A01F-5DAA-4543-9680-2B7F66329F90\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AC99346-DBF1-4060-8E6B-35D315944ADA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"495CC88D-C7EC-4229-AB47-1DA2500C7676\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72C86198-0BD4-42E1-974B-70A49F82C411\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"32190150-8A13-465C-9507-652D6EF1668B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"2E976EAC-4465-4B59-B753-2EF177B1AAAD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E25652AB-E243-4C40-BE12-AB53AF52CD61\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"romepi-sp3_1.0.0.c\", \"matchCriteriaId\": \"137A3BE7-9131-4741-A675-AA2325F4828E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"337E685C-4B65-441C-AD06-E8374CC39450\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"808C582D-4F80-4378-B177-012EEF438443\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1031085D-AD15-4124-803E-9B742E7484A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39B10F2F-6796-4267-9664-C6C68B8EEA47\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"304C61BE-2438-49EE-A581-4A4EEC2923E4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"807AA72C-4BC8-4A02-B158-98C52648AA09\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B92717AF-0F69-4A7D-BC06-B0E287AA8008\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FF47017-569D-4333-8F2D-A6C1D1EE166E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82854E42-76EC-4428-9975-B5FBC8DC6FF8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5454A72B-76EC-46D9-8675-97DC076D7615\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"978DF75D-F7B7-40F6-8054-9551306106F7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7AE0210-F156-42BA-AAD5-177A2E845A4B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72F74102-CBC1-4BB8-80A7-A2DCB6F4239A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73A86733-31A4-4146-9539-01883B0D315A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85D99997-1389-493E-BDEA-9904A46E48EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E61614-68FD-437A-8037-801E0663CBD8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D16B66-A4EC-422D-856A-A862ECE13FBE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54611A05-BCA3-495A-8CDB-946FF47E0333\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC97F277-4BFD-41D7-A205-631C6FBE8DAB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC4654E-519B-4412-B551-F2436108152B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38997E8B-D2B7-4AB2-BB6E-33966511AF38\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B99E921-4023-4E28-BAB7-A830487B3850\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4DA33B2-B942-447F-9229-A41808411F38\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91D4E46F-20BB-46BE-A36F-826E2A15E931\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FD86A5C-A9A9-4C84-91D9-54F2516E8487\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16BC515-84AE-432F-853B-822E737C242F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF14DD9D-3906-4E4F-804E-00B41525285C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F99F7EA-8CDF-45F5-9579-E902C3D02E7F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B1FF616-B7B9-41E1-9F16-86B24C5FA22C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C215E52-0E0C-42F5-9140-8313E847A2FC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09342618-057F-4F49-A43F-352212738F80\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53240910-3F88-465C-A0CD-A98395A05756\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ED8BD87-468E-4953-96B1-CF923985B963\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F23104CA-40BB-497E-809E-B89BDBB8B844\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A468A5E6-BCFA-4141-955E-D7AFE1737913\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.\"}, {\"lang\": \"es\", \"value\": \"Una comprobaci\\u00f3n de l\\u00edmites insuficiente en System Management Unit (SMU) puede causar accesos/actualizaciones de memoria no v\\u00e1lidos que podr\\u00edan resultar en el colapso de la SMU y la consiguiente incapacidad para atender otras peticiones de otros componentes\"}]",
"id": "CVE-2021-26336",
"lastModified": "2024-11-21T05:56:08.037",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-11-16T19:15:08.323",
"references": "[{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-26336\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2021-11-16T19:15:08.323\",\"lastModified\":\"2024-11-21T05:56:08.037\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n de l\u00edmites insuficiente en System Management Unit (SMU) puede causar accesos/actualizaciones de memoria no v\u00e1lidos que podr\u00edan resultar en el colapso de la SMU y la consiguiente incapacidad para atender otras peticiones de otros componentes\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"85F21749-D015-4195-BCF5-0EC546559090\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"E55A8C48-979D-4824-BCCB-D3C6FE1BAECD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A05BAA-D9ED-411D-AEC7-DBD8998C345E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"2C7CAA93-4553-4EE7-8DED-4E607F62DAF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"C793CE0D-A5D2-4279-8A2E-056C0E34DCD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"C951EB53-A85E-4AC3-8076-167AD244B605\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"AA050CB2-9587-4534-A766-D434ED2BA2BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"B09197BA-5C2D-4616-BADF-A6D2FE9FB044\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678C5F58-8AE9-46FF-8F01-4CF394C87A2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"AC530984-C23F-4C2A-B07A-689C69C08EC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"1271AB1A-2AD6-4837-801F-53B25724AD06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"7596F9F6-7216-4A6C-A1A4-02F1719A5506\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241E39FF-FE66-444C-A4C2-3D28C45341BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"01FE866B-C654-4A7A-B65A-A3BEFA896D87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"0655082D-02E4-4708-B749-F035E87A3CCA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"30CDB8F3-A757-449B-A66E-3F0E443E6001\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"8F375A23-E6B5-4998-960D-764AE7F2E202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"1DD8F2DC-5263-4FDF-B13A-70A4D15361A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"FA78545E-FDD6-49DA-8DDD-F1FB504EC59A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"FD918198-F9C6-41B3-A338-F64DEBCC017C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi-sp3_1.0.0.4\",\"matchCriteriaId\":\"89BE6D92-D0B1-4092-ACB7-DE987FC026B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"0DBC6D60-29B4-4A9C-B991-D8968A218F20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D55BEF-AFC8-45DC-9401-5DEF374E16C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"57089BAE-679F-473F-9737-E7122BFC48F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"145D27E6-850A-49AA-AAB3-B432151A41D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"85EF80C4-99FA-4662-867A-9E4B766D3CB9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"483A580F-1308-4898-B995-2D5DFB445205\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"EA3612A0-938A-4148-9008-A4267D7C5B98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"F77A628F-9D88-4868-996D-D44AAD8E1D85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"289C6D4D-8BC6-4DE3-8355-13AC1940F9EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"5EE9574E-39B8-4FEE-B560-20BA5019F4CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"3A1964EC-9D00-4399-8C9C-469EB7195039\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"B2F07874-0B84-4321-B5A2-BD655F001FEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"58DA87AB-FA43-4C46-96DC-B6A117722A8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"08A5A80E-1468-4F29-BD8E-65E8B1998B17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"BBAC3939-49D7-4338-A138-17987C0EB577\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"E9580EB1-B700-40C9-92F7-0C7F0A31321D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"7132A01F-5DAA-4543-9680-2B7F66329F90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"495CC88D-C7EC-4229-AB47-1DA2500C7676\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72C86198-0BD4-42E1-974B-70A49F82C411\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"32190150-8A13-465C-9507-652D6EF1668B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"2E976EAC-4465-4B59-B753-2EF177B1AAAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi-sp3_1.0.0.c\",\"matchCriteriaId\":\"137A3BE7-9131-4741-A675-AA2325F4828E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337E685C-4B65-441C-AD06-E8374CC39450\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808C582D-4F80-4378-B177-012EEF438443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1031085D-AD15-4124-803E-9B742E7484A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B10F2F-6796-4267-9664-C6C68B8EEA47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"304C61BE-2438-49EE-A581-4A4EEC2923E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807AA72C-4BC8-4A02-B158-98C52648AA09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92717AF-0F69-4A7D-BC06-B0E287AA8008\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF47017-569D-4333-8F2D-A6C1D1EE166E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82854E42-76EC-4428-9975-B5FBC8DC6FF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454A72B-76EC-46D9-8675-97DC076D7615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978DF75D-F7B7-40F6-8054-9551306106F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AE0210-F156-42BA-AAD5-177A2E845A4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F74102-CBC1-4BB8-80A7-A2DCB6F4239A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A86733-31A4-4146-9539-01883B0D315A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D99997-1389-493E-BDEA-9904A46E48EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E61614-68FD-437A-8037-801E0663CBD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D16B66-A4EC-422D-856A-A862ECE13FBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54611A05-BCA3-495A-8CDB-946FF47E0333\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC97F277-4BFD-41D7-A205-631C6FBE8DAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC4654E-519B-4412-B551-F2436108152B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38997E8B-D2B7-4AB2-BB6E-33966511AF38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99E921-4023-4E28-BAB7-A830487B3850\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DA33B2-B942-447F-9229-A41808411F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D4E46F-20BB-46BE-A36F-826E2A15E931\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD86A5C-A9A9-4C84-91D9-54F2516E8487\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF14DD9D-3906-4E4F-804E-00B41525285C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F99F7EA-8CDF-45F5-9579-E902C3D02E7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1FF616-B7B9-41E1-9F16-86B24C5FA22C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C215E52-0E0C-42F5-9140-8313E847A2FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53240910-3F88-465C-A0CD-A98395A05756\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED8BD87-468E-4953-96B1-CF923985B963\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F23104CA-40BB-497E-809E-B89BDBB8B844\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A468A5E6-BCFA-4141-955E-D7AFE1737913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
FKIE_CVE-2021-26336
Vulnerability from fkie_nvd - Published: 2021-11-16 19:15 - Updated: 2024-11-21 05:56
Severity ?
Summary
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39B10F2F-6796-4267-9664-C6C68B8EEA47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "304C61BE-2438-49EE-A581-4A4EEC2923E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "807AA72C-4BC8-4A02-B158-98C52648AA09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B92717AF-0F69-4A7D-BC06-B0E287AA8008",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF47017-569D-4333-8F2D-A6C1D1EE166E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82854E42-76EC-4428-9975-B5FBC8DC6FF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n de l\u00edmites insuficiente en System Management Unit (SMU) puede causar accesos/actualizaciones de memoria no v\u00e1lidos que podr\u00edan resultar en el colapso de la SMU y la consiguiente incapacidad para atender otras peticiones de otros componentes"
}
],
"id": "CVE-2021-26336",
"lastModified": "2024-11-21T05:56:08.037",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-11-16T19:15:08.323",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-G84M-4Q6R-8C89
Vulnerability from github – Published: 2022-05-24 19:20 – Updated: 2022-05-24 19:20
VLAI?
Details
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2021-26336"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-11-16T19:15:00Z",
"severity": "MODERATE"
},
"details": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.",
"id": "GHSA-g84m-4q6r-8c89",
"modified": "2022-05-24T19:20:46Z",
"published": "2022-05-24T19:20:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26336"
},
{
"type": "WEB",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
},
{
"type": "WEB",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2021-26336
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-26336",
"description": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.",
"id": "GSD-2021-26336",
"references": [
"https://www.suse.com/security/cve/CVE-2021-26336.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-26336"
],
"details": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.",
"id": "GSD-2021-26336",
"modified": "2023-12-13T01:23:33.805756Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
"ID": "CVE-2021-26336",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ryzen\u2122 Series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
},
{
"product_name": " Athlon\u2122 Series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tbd"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
},
"source": {
"advisory": "AMD-SB-1027 ",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "milanpi-sp3_1.0.0.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "romepi-sp3_1.0.0.c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"ID": "CVE-2021-26336"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-07T13:50Z",
"publishedDate": "2021-11-16T19:15Z"
}
}
}
WID-SEC-W-2022-0073
Vulnerability from csaf_certbund - Published: 2022-05-10 22:00 - Updated: 2025-02-16 23:00Summary
AMD Prozessoren: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff: Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme: - BIOS/Firmware
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
References
28 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Prozessoren sind die zentralen Rechenwerke eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0073 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0073 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073"
},
{
"category": "external",
"summary": "AMD Security Advisory vom 2022-05-10",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
},
{
"category": "external",
"summary": "AMD Security Advisory vom 2022-05-10",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
},
{
"category": "external",
"summary": "Lenovo Security Advisory vom 2022-05-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-87863"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBHF03792 vom 2022-05-12",
"url": "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF04235 vom 2022-05-17",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us\u0026hprpt_id=ALERT_HPE_3023598\u0026jumpid=em_pom8nu6hj_aid-520066529"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20",
"url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07",
"url": "https://alas.aws.amazon.com/ALAS-2022-1606.html"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404"
},
{
"category": "external",
"summary": "AMD Security Bulletin",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14775-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14796-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14777-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14800-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14770-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14776-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14797-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RLB6EQ4PQFULA6326VPRQRWW66T32SST/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14787-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14778-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14791-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14804-1 vom 2025-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/"
}
],
"source_lang": "en-US",
"title": "AMD Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-16T23:00:00.000+00:00",
"generator": {
"date": "2025-02-17T09:16:43.421+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-0073",
"initial_release_date": "2022-05-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-05-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2022-05-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2022-05-26T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-02T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-07-07T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-01-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-04-02T22:00:00.000+00:00",
"number": "10",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2024-02-13T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von AMD aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Epyc",
"product": {
"name": "AMD Prozessor Epyc",
"product_id": "T020995",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:epyc"
}
}
},
{
"category": "product_version",
"name": "Ryzen",
"product": {
"name": "AMD Prozessor Ryzen",
"product_id": "T023180",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:ryzen"
}
}
},
{
"category": "product_version",
"name": "Athlon",
"product": {
"name": "AMD Prozessor Athlon",
"product_id": "T023181",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:athlon"
}
}
},
{
"category": "product_name",
"name": "AMD Prozessor",
"product": {
"name": "AMD Prozessor",
"product_id": "T029010",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:-"
}
}
}
],
"category": "product_name",
"name": "Prozessor"
}
],
"category": "vendor",
"name": "AMD"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "HP Computer",
"product": {
"name": "HP Computer",
"product_id": "T023191",
"product_identification_helper": {
"cpe": "cpe:/h:hp:computer:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12931",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12931"
},
{
"cve": "CVE-2020-12944",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12944"
},
{
"cve": "CVE-2020-12946",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12946"
},
{
"cve": "CVE-2020-12951",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12951"
},
{
"cve": "CVE-2021-0153",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0153"
},
{
"cve": "CVE-2021-0154",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0154"
},
{
"cve": "CVE-2021-0155",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0155"
},
{
"cve": "CVE-2021-0159",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0159"
},
{
"cve": "CVE-2021-0188",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0188"
},
{
"cve": "CVE-2021-0189",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0189"
},
{
"cve": "CVE-2021-0190",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0190"
},
{
"cve": "CVE-2021-21131",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-21131"
},
{
"cve": "CVE-2021-21136",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-21136"
},
{
"cve": "CVE-2021-26312",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26312"
},
{
"cve": "CVE-2021-26317",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26317"
},
{
"cve": "CVE-2021-26335",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26335"
},
{
"cve": "CVE-2021-26336",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26336"
},
{
"cve": "CVE-2021-26337",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26337"
},
{
"cve": "CVE-2021-26339",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26342",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26342"
},
{
"cve": "CVE-2021-26347",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26347"
},
{
"cve": "CVE-2021-26348",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26349",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26349"
},
{
"cve": "CVE-2021-26350",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26350"
},
{
"cve": "CVE-2021-26351",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26351"
},
{
"cve": "CVE-2021-26352",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26352"
},
{
"cve": "CVE-2021-26361",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26361"
},
{
"cve": "CVE-2021-26362",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26362"
},
{
"cve": "CVE-2021-26363",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26363"
},
{
"cve": "CVE-2021-26364",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26366",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26366"
},
{
"cve": "CVE-2021-26368",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26368"
},
{
"cve": "CVE-2021-26369",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26369"
},
{
"cve": "CVE-2021-26372",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26372"
},
{
"cve": "CVE-2021-26373",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26373"
},
{
"cve": "CVE-2021-26375",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-26376",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26376"
},
{
"cve": "CVE-2021-26378",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26378"
},
{
"cve": "CVE-2021-26384",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26384"
},
{
"cve": "CVE-2021-26386",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26386"
},
{
"cve": "CVE-2021-26388",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26388"
},
{
"cve": "CVE-2021-26390",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26390"
},
{
"cve": "CVE-2021-33103",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33103"
},
{
"cve": "CVE-2021-33117",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33117"
},
{
"cve": "CVE-2021-33122",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33122"
},
{
"cve": "CVE-2021-33123",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33123"
},
{
"cve": "CVE-2021-33124",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33124"
},
{
"cve": "CVE-2021-39298",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-39298"
},
{
"cve": "CVE-2022-0005",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2022-0005"
},
{
"cve": "CVE-2022-21151",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2022-21151"
},
{
"cve": "CVE-2023-20558",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2023-20558"
},
{
"cve": "CVE-2023-20559",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2023-20559"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…