Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-0123 (GCVE-0-2019-0123)
Vulnerability from cvelistv5
- Escalation of Privilege
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | 2019.2 IPU – Intel(R) SGX and TXT |
Version: See provided reference |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:44:14.479Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "2019.2 IPU \u2013 Intel(R) SGX and TXT",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-26T10:07:06",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 Intel(R) SGX and TXT",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"name": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2019-0123",
"datePublished": "2019-11-14T19:07:45",
"dateReserved": "2018-11-13T00:00:00",
"dateUpdated": "2024-08-04T17:44:14.479Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-0123\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-11-14T20:15:11.290\",\"lastModified\":\"2024-11-21T04:16:16.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Una protecci\u00f3n insuficiente de la memoria en Intel\u00ae 6th Generation Core Processors y superiores, compatibles con SGX, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37ED0DB6-A589-4CB7-87AD-102FE7490AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD476-E402-408D-9BD6-886AB195704D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3EB3692-06DA-4EED-8F5E-D21ECC9EEDEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B1B04E8-A31F-4027-8E05-5461E7855F04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EE53DA-4639-4714-B956-CC69BBCC6D26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B5258B-26E4-4853-9F27-4BB12886CC38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86F4A2B-B4B4-42E2-8D5D-E31D06456C76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112701D9-7154-46E5-BF36-EE36A607C7DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237D4E3F-F132-4D6E-95F8-C607EC09CB50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F450DA-5FBA-47BB-9A7D-75873FB3E69F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6484B4DA-85FA-4BF9-9B4A-157BC2ED2889\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638549EC-1BB1-4206-B8DC-C0101BBEF8A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A91E832-9A60-4552-9388-DA779F9C4A9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C173CF7E-81DF-4AD5-AB17-A4C330B933D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34D8B71-549C-400A-976F-AA170F1D7B08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0BDFFB-638F-4FB7-A43A-812874D8774A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1912C4B-2371-463E-868C-3C35050E2A06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFC55E4-D84D-4588-976D-1E2637B1BF0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46994C87-8D86-4699-8257-DFAB90D08A09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBDCB2FA-B3D8-4922-B8B5-7FAA4A574D0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC1A189-D822-405B-A090-B1573FE12B14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE88726F-B548-4FF1-8E76-90DD6CFC12E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86FFF97C-C121-4F91-B62F-057356B0A048\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DD0B86-37A4-4927-97C5-86B165590105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C57E58-66E3-4FEC-A88F-B82C4B372B2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8851E2-CD05-4575-83E3-F801C1785A59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B09CA-91E9-4D11-AA11-B84F40495E9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB96985-BB1A-4F60-8259-E3AD4ACAD8CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3EA33F-D137-4B24-9211-C8A62A7427A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFAE743-376B-4FD1-8391-664D97667105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3DB891-40F6-4000-BEAE-A1710C70C43D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C00E0312-D1D1-410D-A3A1-74495AA1C2C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B79264-C756-408C-A32A-BFD4AA0B20CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CEC4C5-B559-4A48-A1D2-7CDB96381CCB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72467515-7793-479B-BABF-839275CA9AAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72876C5-C084-4DD3-9BC8-894C4BE40C15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5726D5D4-F188-4F06-B78A-2C7C694A40E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B450C9-CDC4-4047-AD77-19A4BC9CB870\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD248D-0B95-4BE1-917F-E0976447927D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A4E442-8E2C-472B-A9C6-56B58B6B55B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6572E2-5B24-4E21-9F6F-3A7A17A9F098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43695191-7897-4028-A8DA-F45D2B4E0C38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9862E49-124E-4B7D-941A-CFD2668B6481\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E88CE3A-812A-4C01-B0D7-D9A154FF2187\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA47107D-237A-4184-8BA2-601660F7FB5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C70D1724-ED58-4675-9A53-F7473D77638B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C1205B-6AC7-4DB5-B247-2108511D9957\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8BAD9D-7253-492A-87B3-CACCF66A332F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13E353-0063-468B-96CD-97BF91C747C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988EDA03-EF3B-402F-B3B4-74BA32A1BCCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D901944-8E2B-41E5-BB82-CF1C97064711\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913BBEFF-49E7-42AF-A850-B49E5A12AB98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ABD229-0EF3-44AC-AD87-6C42EF48BF2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBFC1253-B337-4F9B-855D-14A3F6AE7EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE126ED-B743-4C6D-95FF-04F473A9A008\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61BD341-9D1F-444C-A5C9-761994866ED2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D57834B-C031-4301-9839-7A32F13687EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C3D738-944D-46A1-A542-32C96A021964\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20E7888-D3A3-4A01-8328-71A81AA0A52A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A97ED15-D0C6-4B64-BA08-EE50A6990272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45D72230-B7C2-4A9C-928F-328666CA3988\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D566CFB-935B-40E4-9F4E-6216A42E7EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16807D5E-1E13-4A98-8217-9AF6CE24A933\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C7AD56-CA31-4C08-A5C1-B50E767E1FFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54606FA5-02CE-43C5-9153-FB1070E9DD15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41EB643A-7C3B-4017-A12C-FB48A4F6D9EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF86B5D-4B93-4DFA-945E-723F49D90F1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DD3CCB-91D5-48D6-80BC-CA643385BCE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B60A1C2-D6E2-43B3-967C-746CDC2F96CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05EA3461-021B-42CD-B4BD-4D2E8703DB93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB14435-11E5-4F75-98BA-0A6D2E4818FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE776B91-9E25-48F5-A4F0-EB36B704AEBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53180F59-BE75-4A62-99ED-3602C025E388\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBB43D3B-BC91-46F1-840E-F6876095FAB9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B77426-B579-43C6-9340-F291138ECD7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08718840-D468-4E86-8FFF-A2B1841E6BF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9530B87C-B5C7-4EE6-BE29-A559BFE9EC18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9530B87C-B5C7-4EE6-BE29-A559BFE9EC18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88971837-5ED9-442C-BAF2-1C6C31105EB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E603DAD7-EC5F-42E9-B902-445599280DC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07279DDB-B07D-4224-AA1C-24B4F3D63BB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48293B3F-0DE7-4100-9512-2D20FC437D12\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8846D3C-39C6-48BE-9643-ACC479416257\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667DFE1-E66C-44BB-916F-0F1257B5289E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4440FC7-F90C-44E0-B7FB-C88BC95EAB77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26584C5B-4599-42CF-9C43-91A7B382756B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04076FFA-D74F-4501-9921-D8EBDF97CD20\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7\\\\+8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7\\\\+8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDCD661-394A-431F-84C2-0252ABD6F1B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942B77AD-CEA4-4A9F-B748-155916A4917A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1ED81E-3D62-47FB-8FD4-B2732525C33C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4EBD70-06C1-4842-AF3E-970218816B18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC82E058-25FE-4B6C-BA3C-AB043CFAB113\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E893B9-92D2-4EA9-BDC6-0E73CA4EE484\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE91A3E-B3EF-444F-A518-9027C1D65C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6774C8-431B-42AC-8955-02B529222372\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4E3B3E-5225-49ED-9159-4503DCDED473\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395788D-E23B-433A-B111-745C55018C68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2495E71F-8DE8-482E-A903-FA00E9A3C697\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A2FFBF5-FA4C-4213-BCBA-D129EC925466\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304CBDA-AF3E-4F32-BF45-FD2199D1E025\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD455EBB-69AE-464A-93AA-13227FBD17E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A2969-DC53-48E2-A5CA-4DF2B00D1960\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A727A1-219F-4B78-B490-0E47340B38F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659206BB-510A-47F8-8B6E-FD030A6BE1DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A8063AB-7D2C-4005-863F-A8BD612B430B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2ADBEF-CF97-410A-816B-F9D1E3BAF205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE70578-1EC4-4A02-95F7-5A23B76E1BEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5598510F-1057-4DB6-838C-8945FB6978DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA036BD6-38AF-4763-9B84-8CD7019BF262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3257F5-CA55-4F35-9D09-5B85253DE786\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D267F336-7023-4DA3-A481-0F6F8A44290C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581CCD85-F9BA-4AE0-8FCD-4118C13C1080\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C365D42-1DEA-4FF2-86E4-1CC27E52E40E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3625E5-4583-4F38-B6E3-68FD20E54ACB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB8CB49-D52E-4C92-9CD5-465615916213\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455BC769-5B19-4B91-844B-15B4FB2401E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CD303F-AAE9-4635-987D-742031232BDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867027D4-9EB4-4BAB-BDCC-FD43A087442F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FD2F07-6CD0-4708-8D11-3BA0AEFD5271\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419680D5-21E0-491C-98AA-9D079213A020\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF1493D-E866-4FA7-93A6-2461053A5C0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC758216-672D-4F7B-8CF3-6433B06AA2FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1163CF40-4D70-4965-8229-B102D754ECD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCE2EBC-82FE-49AB-857B-403C7ACE5091\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199A5D61-EB42-4C3C-9344-4CA497358D7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C289687E-4D0F-4F32-92A8-137B5D6AA3C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"662A5846-DA15-431B-9392-F0BA5457FDE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7CD68D-6177-4F61-ABAF-C88453BD6C52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E7038-2BFF-4372-8D28-2C72017EADB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D63DC7-0623-4777-86EC-06697FEBFD10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7092CF-E482-4103-8AF9-A4C19238F9D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA491401-C484-4F77-ABF8-D389C94BF7B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D449326-502E-488D-9933-863B9CF997FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E24442-6697-4D2D-9515-43E4370474B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD97F84B-ED73-4FFD-8634-10631FEE03EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216DE05B-001E-47FE-B35A-55319B095853\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C0CFB-72A3-4446-9601-2C956C9A71F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A6C110-BE1A-4D3E-A048-D63F4F64B1E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADED698-2702-479C-A24E-E9E6F35E9AFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D19BB027-D927-4D06-A580-6C6E3E077B7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4426C-970C-49DB-950B-3F5ED17E682A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC32129-C5DC-4D26-96D5-219F5291D6F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA4F635-86BE-409A-A619-9EEA4C4B4FBA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6592D-743B-4656-B1C0-247F36ABE5CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F981A8EE-13BB-42C2-91D0-631247A03CB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CC9B92-CF59-4121-9638-F4D4521952D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A3CE35-5572-4355-B063-08DA49917126\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9490F926-AD57-40F3-A523-61D67486DCB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8F7DCA-3FA7-4943-9458-13695F529BBA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B5BF22-5E95-46A4-AF05-450CFD1312C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A77114-92C8-48C4-9D12-3ACC3030D5A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C619D6-6275-465E-9023-25EEFC298711\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057E3667-7BA8-4142-8A1E-B957333D776A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077BFDB3-CACE-4600-8ABE-DE079EDA8D6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A99895-6A48-4A44-B0F7-7BED55C677FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49E7867-14E6-4DB4-93D8-A108996F7B75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A10975-3375-4FB3-A008-56EB2ACD2737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8925FB8-D645-4DE0-A37A-4BCAEA1EBE08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CE1171D-9B4E-4134-8489-F44B2912E310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D7D164-E631-4D49-B87A-0B7885148790\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E61222-34B1-47AB-806F-DAAA4B41BD45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E257946A-458F-4F27-8387-9CF4DB8193FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE01A935-4048-4578-8FBA-1D12A95654D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5919FA36-0AB9-4D42-B33F-7795BD7601BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BD1F0B-7B75-4A5A-A708-BDE56D237354\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1746995D-CCA1-4858-87C5-8E2DC51FDA75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E0227B-8F2B-48B3-97BC-73BA1BACEED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7ABA76A-91AE-4524-9013-2BF843FFB5DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DB4F8D-E42C-4119-83BD-44D6AB9319B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47759461-35C3-4F77-9D96-B4929075CC17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC1EDA9-6CB8-4643-AC65-76B892319879\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3760BA20-5E0D-460C-BDD5-6E456646D814\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BCDBDF-A902-43A8-94A8-13541FB8CB32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"030F2C9A-E9F8-4B29-857A-B6A895C54A61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E629CF7-A706-4DD3-B3EB-A1F9711B0372\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5111864-B660-4603-BC03-94A719C8D2EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA12E60-4B0A-4723-8A02-3115494CD1DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE48BFF-CCB4-423D-968C-013060E447E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542BC61B-1EA3-4C42-BB99-C9C67EE82F7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C056C18D-457C-4216-8B91-84A4628DE44E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BF874F-B640-4A18-AC92-F0E16AB7E1C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1273C6-1F76-4366-88A2-A3955CB1CE3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF4F98-0672-4101-9825-57B0F64EDBEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9BABD0-E0D7-4D9D-B998-0FB23612E7BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2231374F-222A-4BA3-B14D-F69860668F7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F6A70D-4925-49A7-BFE9-A1B7F2CD6FF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2559D24-F8AD-4202-A00D-F48D51A0940A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32F3CD6-6BA6-40E7-9580-3C1A455B3C99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6185880A-E648-46C3-B14E-42DB61113C59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC9CEA2-C621-4DCF-B64C-5495D3208DB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65F8523D-BA5F-4BD8-A15F-A49B12001986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F2476F2-6A8B-442F-B054-738F36613CE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE98CB9-14D8-4297-807B-33F9B376D37B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333364EE-BF57-4217-9517-2C1B95B826CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B02BC8-A29C-48B9-B66C-2BD9C241DFD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5EFEF14-4ECB-45C9-8911-01FD7B115D7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3214D779-E335-4141-882F-CBB3A3317CDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C57129-0A27-4142-BF6E-68A558773573\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E031BE7-87C6-4E4B-8988-020221ECAEE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A393CA-35AB-4F8D-9A33-9693905DA445\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD11A3F-A2D4-4B09-84D2-548F97268805\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3540784A-1B0B-41EE-AB66-A293AC400C39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39616E34-9182-485B-B6AE-566DE2E77AA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C562AA0-3A76-4223-A5E4-13B2898FBC43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F68C14E0-5711-4D18-B529-AA0EE3BDC99C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFD79A0-2F24-484C-AD4A-D58B7414788E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE469B71-77FC-4940-AF10-631D73DEF18A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E6609BC-7E90-41F9-91A3-4139100D7A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98D6031F-201E-4FF2-A233-BF4C96ECF4B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF1AC701-DF74-457B-8CB6-FA35E0E78F29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC07C3B-8ECF-4BF1-A08D-907319EFFC34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EEEF17-0881-448C-A984-D5EFCB0F68EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A528C2-662C-40B1-8C71-A5A4134A6314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F222C991-CA9F-48FB-AC22-D8F6B837F8D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40D7630-3069-4AF7-B2B9-9AFF96A43AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DFA1D1-C133-4152-A66A-C70800905E17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9C4CE2-F65F-41FE-947C-16AD1558D03B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE808573-A9E6-4DFE-82E1-08546F5BF451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EB59BF-2708-4C3C-BA60-F621E067D824\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FAB23F-A289-42E6-BA8E-C4A061A9604C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4ABBE1-EE80-4FED-BBA7-A552BE31A826\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73DA92B-919E-4F75-A4A7-54E7F892BB24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1490C2DA-4627-4BAC-A505-E434A81FBDC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B263A8AF-03E7-4B05-888B-3395A2B10BF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1C21E5-81FF-45EE-836B-E809C8F34440\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7C6423-2E99-41D6-AD38-17658F1B1D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3540784A-1B0B-41EE-AB66-A293AC400C39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39616E34-9182-485B-B6AE-566DE2E77AA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C562AA0-3A76-4223-A5E4-13B2898FBC43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F68C14E0-5711-4D18-B529-AA0EE3BDC99C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFD79A0-2F24-484C-AD4A-D58B7414788E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE469B71-77FC-4940-AF10-631D73DEF18A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E6609BC-7E90-41F9-91A3-4139100D7A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98D6031F-201E-4FF2-A233-BF4C96ECF4B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF1AC701-DF74-457B-8CB6-FA35E0E78F29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC07C3B-8ECF-4BF1-A08D-907319EFFC34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EEEF17-0881-448C-A984-D5EFCB0F68EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A528C2-662C-40B1-8C71-A5A4134A6314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F222C991-CA9F-48FB-AC22-D8F6B837F8D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40D7630-3069-4AF7-B2B9-9AFF96A43AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DFA1D1-C133-4152-A66A-C70800905E17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9C4CE2-F65F-41FE-947C-16AD1558D03B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE808573-A9E6-4DFE-82E1-08546F5BF451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EB59BF-2708-4C3C-BA60-F621E067D824\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FAB23F-A289-42E6-BA8E-C4A061A9604C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4ABBE1-EE80-4FED-BBA7-A552BE31A826\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73DA92B-919E-4F75-A4A7-54E7F892BB24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1490C2DA-4627-4BAC-A505-E434A81FBDC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B263A8AF-03E7-4B05-888B-3395A2B10BF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1C21E5-81FF-45EE-836B-E809C8F34440\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7C6423-2E99-41D6-AD38-17658F1B1D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"}]}]}],\"references\":[{\"url\":\"https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2020-AVI-618
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security (SNS) versions antérieures à 4.1.1. Cette version est la seule qui corrige toutes les vulnérabilités mentionnées dans les avis Stormshield dont les liens sont présentés ici. Nous invitons nos lecteurs à faire leur propre analyse de risque quant au choix de la version qui correspond le mieux à leurs besoins. | ||
| Stormshield | N/A | Netasq versions 9.x |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security (SNS) versions ant\u00e9rieures \u00e0 4.1.1. Cette version est la seule qui corrige toutes les vuln\u00e9rabilit\u00e9s mentionn\u00e9es dans les avis Stormshield dont les liens sont pr\u00e9sent\u00e9s ici. Nous invitons nos lecteurs \u00e0 faire leur propre analyse de risque quant au choix de la version qui correspond le mieux \u00e0 leurs besoins.",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
},
{
"name": "CVE-2019-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
},
{
"name": "CVE-2019-11157",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11157"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2016-8858",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
},
{
"name": "CVE-2020-11711",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11711"
},
{
"name": "CVE-2019-14607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14607"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
},
{
"name": "CVE-2019-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
}
],
"initial_release_date": "2020-10-05T00:00:00",
"last_revision_date": "2020-10-05T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-618",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-013 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2020-013/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-012 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2020-012/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2019-013 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2019-013/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2019-026 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2019-026/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-011 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2020-011/"
}
]
}
CERTFR-2019-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les microgiciels Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel PTT versions antérieures à 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-X_x antérieures à SPS_SoC-X_04.00.04.086.0 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x antérieures à 11.22.70 | ||
| Intel | N/A | Les processeurs Intel, voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x antérieures à 13.0.10 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x antérieures à 12.0.45 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions antérieures à 11.8.70 | ||
| Intel | N/A | Intel SPS versions SPS_E5_x antérieures à SPS_E5_04.00.04.381.0 | ||
| Intel | N/A | Intel SPS versions SPS_E3_x antérieures à SPS_E3_04.01.04.054.0 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-A_x antérieures à SPS_SoC-A_04.00.04.181.0 | ||
| Intel | N/A | Le microgiciel des contrôleurs Ethernet Intel séries 700 versions antérieures à 7.0 | ||
| Intel | N/A | Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Le logiciel pour contrôleurs Ethernet Intel séries 700 versions antérieure à 24.0 | ||
| Intel | N/A | Intel TXE versions 3.0.x et 3.1.x antérieures à 3.1.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x antérieures à 11.11.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x antérieures à 14.0.10 | ||
| Intel | N/A | Intel TXE versions 4.0.x antérieures à 4.0.20 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel PTT versions ant\u00e9rieures \u00e0 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-X_x ant\u00e9rieures \u00e0 SPS_SoC-X_04.00.04.086.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x ant\u00e9rieures \u00e0 11.22.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les processeurs Intel, voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x ant\u00e9rieures \u00e0 13.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x ant\u00e9rieures \u00e0 12.0.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions ant\u00e9rieures \u00e0 11.8.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E5_x ant\u00e9rieures \u00e0 SPS_E5_04.00.04.381.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E3_x ant\u00e9rieures \u00e0 SPS_E3_04.01.04.054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-A_x ant\u00e9rieures \u00e0 SPS_SoC-A_04.00.04.181.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le microgiciel des contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le logiciel pour contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieure \u00e0 24.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 3.0.x et 3.1.x ant\u00e9rieures \u00e0 3.1.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x ant\u00e9rieures \u00e0 11.11.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x ant\u00e9rieures \u00e0 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0143"
},
{
"name": "CVE-2019-11179",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11179"
},
{
"name": "CVE-2019-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
},
{
"name": "CVE-2019-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0150"
},
{
"name": "CVE-2019-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2019-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
},
{
"name": "CVE-2019-11170",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11170"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2019-11137",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11137"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2019-11175",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11175"
},
{
"name": "CVE-2019-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0139"
},
{
"name": "CVE-2019-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0140"
},
{
"name": "CVE-2019-11172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11172"
},
{
"name": "CVE-2019-11177",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11177"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2019-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0141"
},
{
"name": "CVE-2019-11136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11136"
},
{
"name": "CVE-2019-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0149"
},
{
"name": "CVE-2019-11181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11181"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2019-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0144"
},
{
"name": "CVE-2019-11173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11173"
},
{
"name": "CVE-2019-11182",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11182"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2019-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0124"
},
{
"name": "CVE-2019-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
},
{
"name": "CVE-2019-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11168"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2019-11171",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11171"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0142"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2019-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0146"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2019-11178",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11178"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2019-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
},
{
"name": "CVE-2019-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
},
{
"name": "CVE-2019-11180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11180"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0148"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2019-11174",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11174"
},
{
"name": "CVE-2019-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0145"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2019-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0147"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les microgiciels\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les microgiciels Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00313 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00219 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00270 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00210 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00240 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00255 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00271 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00260 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00280 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00164 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00241 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00220 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
}
]
}
WID-SEC-W-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
wid-sec-w-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
cnvd-2020-18613
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html
| Name | ['Intel intel Core i7 6970HQ', 'Intel intel Core i7 6920HQ', 'Intel intel Core i7 6870HQ', 'Intel intel Core i7 6822EQ', 'Intel intel Core i7 6820HQ', 'Intel intel Core i7 6820HK'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-0123",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-0123"
}
},
"description": "Intel 6th Generation Core Processors\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u7b2c\u516d\u4ee3Core\uff08\u9177\u777f\uff09\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u4ea7\u54c1\u3002\n\nIntel 6th Generation Core Processors\u53ca\u540e\u7cfb\u5217\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-18613",
"openTime": "2020-03-22",
"patchDescription": "Intel 6th Generation Core Processors\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u7b2c\u516d\u4ee3Core\uff08\u9177\u777f\uff09\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u4ea7\u54c1\u3002\r\n\r\nIntel 6th Generation Core Processors\u53ca\u540e\u7cfb\u5217\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Intel 6th Generation Core Processors\u53ca\u540e\u7cfb\u5217\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Intel intel Core i7 6970HQ",
"Intel intel Core i7 6920HQ",
"Intel intel Core i7 6870HQ",
"Intel intel Core i7 6822EQ",
"Intel intel Core i7 6820HQ",
"Intel intel Core i7 6820HK"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-0123",
"serverity": "\u9ad8",
"submitTime": "2019-12-06",
"title": "Intel 6th Generation Core Processors\u53ca\u540e\u7cfb\u5217\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
ghsa-j5pf-g8fv-p83c
Vulnerability from github
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.
{
"affected": [],
"aliases": [
"CVE-2019-0123"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-14T20:15:00Z",
"severity": "HIGH"
},
"details": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GHSA-j5pf-g8fv-p83c",
"modified": "2024-04-04T02:39:09Z",
"published": "2022-05-24T17:00:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0123"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2019-0123
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2019-0123",
"description": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GSD-2019-0123"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-0123"
],
"details": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GSD-2019-0123",
"modified": "2023-12-13T01:23:39.521468Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 Intel(R) SGX and TXT",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"name": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0123"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"name": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2019-11-14T20:15Z"
}
}
}
fkie_cve-2019-0123
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://support.f5.com/csp/article/K81556107?utm_source=f5support&%3Butm_medium=RSS | ||
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K81556107?utm_source=f5support&%3Butm_medium=RSS | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | core_i7-6970hq_firmware | - | |
| intel | core_i7-6970hq | - | |
| intel | core_i7-6920hq_firmware | - | |
| intel | core_i7-6920hq | - | |
| intel | core_i7-6870hq_firmware | - | |
| intel | core_i7-6870hq | - | |
| intel | core_i7-6822eq_firmware | - | |
| intel | core_i7-6822eq | - | |
| intel | core_i7-6820hq_firmware | - | |
| intel | core_i7-6820hq | - | |
| intel | core_i7-6820hk_firmware | - | |
| intel | core_i7-6820hk | - | |
| intel | core_i7-6820eq_firmware | - | |
| intel | core_i7-6820eq | - | |
| intel | core_i7-6785r_firmware | - | |
| intel | core_i7-6785r | - | |
| intel | core_i7-6700k_firmware | - | |
| intel | core_i7-6700k | - | |
| intel | core_i7-6700t_firmware | - | |
| intel | core_i7-6700t | - | |
| intel | core_i7-6700te_firmware | - | |
| intel | core_i7-6700te | - | |
| intel | core_i7-6700_firmware | - | |
| intel | core_i7-6700 | - | |
| intel | core_i7-6770hq_firmware | - | |
| intel | core_i7-6770hq | - | |
| intel | core_i7-6700hq_firmware | - | |
| intel | core_i7-6700hq | - | |
| intel | core_i7-6660u_firmware | - | |
| intel | core_i7-6660u | - | |
| intel | core_i7-6650u_firmware | - | |
| intel | core_i7-6650u | - | |
| intel | core_i7-6600u_firmware | - | |
| intel | core_i7-6600u | - | |
| intel | core_i7-6567u_firmware | - | |
| intel | core_i7-6567u | - | |
| intel | core_i7-6560u_firmware | - | |
| intel | core_i7-6560u | - | |
| intel | core_i7-6500u_firmware | - | |
| intel | core_i7-6500u | - | |
| intel | core_i7-7920hq_firmware | - | |
| intel | core_i7-7920hq | - | |
| intel | core_i7-7820hq_firmware | - | |
| intel | core_i7-7820hq | - | |
| intel | core_i7-7820hk_firmware | - | |
| intel | core_i7-7820hk | - | |
| intel | core_i7-7820eq_firmware | - | |
| intel | core_i7-7820eq | - | |
| intel | core_i7-7700hq_firmware | - | |
| intel | core_i7-7700hq | - | |
| intel | core_i7-7700_firmware | - | |
| intel | core_i7-7700 | - | |
| intel | core_i7-7700k_firmware | - | |
| intel | core_i7-7700k | - | |
| intel | core_i7-7700t_firmware | - | |
| intel | core_i7-7700t | - | |
| intel | core_i7-7660u_firmware | - | |
| intel | core_i7-7660u | - | |
| intel | core_i7-7600u_firmware | - | |
| intel | core_i7-7600u | - | |
| intel | core_i7-7567u_firmware | - | |
| intel | core_i7-7567u | - | |
| intel | core_i7-7560u_firmware | - | |
| intel | core_i7-7560u | - | |
| intel | core_i7-7500u_firmware | - | |
| intel | core_i7-7500u | - | |
| intel | core_i7-7y75_firmware | - | |
| intel | core_i7-7y75 | - | |
| intel | core_i7-8665ue_firmware | - | |
| intel | core_i7-8665ue | - | |
| intel | core_i7-8665u_firmware | - | |
| intel | core_i7-8665u | - | |
| intel | core_i7-8557u_firmware | - | |
| intel | core_i7-8557u | - | |
| intel | core_i7-8850h_firmware | - | |
| intel | core_i7-8850h | - | |
| intel | core_i7-8809g_firmware | - | |
| intel | core_i7-8809g | - | |
| intel | core_i7-8750h_firmware | - | |
| intel | core_i7-8750h | - | |
| intel | core_i7-8709g_firmware | - | |
| intel | core_i7-8709g | - | |
| intel | core_i7-8706g_firmware | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8706g_firmware | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8705g_firmware | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8700t_firmware | - | |
| intel | core_i7-8700t | - | |
| intel | core_i7-8700k_firmware | - | |
| intel | core_i7-8700k | - | |
| intel | core_i7-8700b_firmware | - | |
| intel | core_i7-8700b | - | |
| intel | core_i7-8700_firmware | - | |
| intel | core_i7-8700 | - | |
| intel | core_i7\+8700_firmware | - | |
| intel | core_i7\+8700 | - | |
| intel | core_i7-8569u_firmware | - | |
| intel | core_i7-8569u | - | |
| intel | core_i7-8650u_firmware | - | |
| intel | core_i7-8650u | - | |
| intel | core_i7-8565u_firmware | - | |
| intel | core_i7-8565u | - | |
| intel | core_i7-8559u_firmware | - | |
| intel | core_i7-8559u | - | |
| intel | core_i7-8550u_firmware | - | |
| intel | core_i7-8550u | - | |
| intel | core_i7-8500y_firmware | - | |
| intel | core_i7-8500y | - | |
| intel | core_i7-8086k_firmware | - | |
| intel | core_i7-8086k | - | |
| intel | core_i9-9980hk_firmware | - | |
| intel | core_i9-9980hk | - | |
| intel | core_i9-9880h_firmware | - | |
| intel | core_i9-9880h | - | |
| intel | core_i9-9900t_firmware | - | |
| intel | core_i9-9900t | - | |
| intel | core_i9-9900ks_firmware | - | |
| intel | core_i9-9900ks | - | |
| intel | core_i9-9900kf_firmware | - | |
| intel | core_i9-9900kf | - | |
| intel | core_i9-9900k_firmware | - | |
| intel | core_i9-9900k | - | |
| intel | core_i9-9900_firmware | - | |
| intel | core_i9-9900 | - | |
| intel | core_i7-9850hl_firmware | - | |
| intel | core_i7-9850hl | - | |
| intel | core_i7-9850he_firmware | - | |
| intel | core_i7-9850he | - | |
| intel | core_i7-9850h_firmware | - | |
| intel | core_i7-9850h | - | |
| intel | core_i7-9750hf_firmware | - | |
| intel | core_i7-9750hf | - | |
| intel | core_i7-9750h_firmware | - | |
| intel | core_i7-9750h | - | |
| intel | core_i7-9700te_firmware | - | |
| intel | core_i7-9700te | - | |
| intel | core_i7-9700t_firmware | - | |
| intel | core_i7-9700t | - | |
| intel | core_i7-9700kf_firmware | - | |
| intel | core_i7-9700kf | - | |
| intel | core_i7-9700k_firmware | - | |
| intel | core_i7-9700k | - | |
| intel | core_i7-9700f_firmware | - | |
| intel | core_i7-9700f | - | |
| intel | core_i7-9700e_firmware | - | |
| intel | core_i7-9700e | - | |
| intel | core_i7-9700_firmware | - | |
| intel | core_i7-9700 | - | |
| intel | core_i7-10710u_firmware | - | |
| intel | core_i7-10710u | - | |
| intel | core_i7-10510u_firmware | - | |
| intel | core_i7-10510u | - | |
| intel | core_i7-10510y_firmware | - | |
| intel | core_i7-10510y | - | |
| intel | xeon_e3-1585_v5_firmware | - | |
| intel | xeon_e3-1585_v5 | - | |
| intel | xeon_e3-1585l_v5_firmware | - | |
| intel | xeon_e3-1585l_v5 | - | |
| intel | xeon_e3-1578l_v5_firmware | - | |
| intel | xeon_e3-1578l_v5 | - | |
| intel | xeon_e3-1575m_v5_firmware | - | |
| intel | xeon_e3-1575m_v5 | - | |
| intel | xeon_e3-1565l_v5_firmware | - | |
| intel | xeon_e3-1565l_v5 | - | |
| intel | xeon_e3-1558l_v5_firmware | - | |
| intel | xeon_e3-1558l_v5 | - | |
| intel | xeon_e3-1545m_v5_firmware | - | |
| intel | xeon_e3-1545m_v5 | - | |
| intel | xeon_e3-1535m_v5_firmware | - | |
| intel | xeon_e3-1535m_v5 | - | |
| intel | xeon_e3-1515m_v5_firmware | - | |
| intel | xeon_e3-1515m_v5 | - | |
| intel | xeon_e3-1505m_v5_firmware | - | |
| intel | xeon_e3-1505m_v5 | - | |
| intel | xeon_e3-1505l_v5_firmware | - | |
| intel | xeon_e3-1505l_v5 | - | |
| intel | xeon_e3-1280_v5_firmware | - | |
| intel | xeon_e3-1280_v5 | - | |
| intel | xeon_e3-1275_v5_firmware | - | |
| intel | xeon_e3-1275_v5 | - | |
| intel | xeon_e3-1270_v5_firmware | - | |
| intel | xeon_e3-1270_v5 | - | |
| intel | xeon_e3-1268l_v5_firmware | - | |
| intel | xeon_e3-1268l_v5 | - | |
| intel | xeon_e3-1260l_v5_firmware | - | |
| intel | xeon_e3-1260l_v5 | - | |
| intel | xeon_e3-1245_v5_firmware | - | |
| intel | xeon_e3-1245_v5 | - | |
| intel | xeon_e3-1240l_v5_firmware | - | |
| intel | xeon_e3-1240l_v5 | - | |
| intel | xeon_e3-1240_v5_firmware | - | |
| intel | xeon_e3-1240_v5 | - | |
| intel | xeon_e3-1235l_v5_firmware | - | |
| intel | xeon_e3-1235l_v5 | - | |
| intel | xeon_e3-1230_v5_firmware | - | |
| intel | xeon_e3-1230_v5 | - | |
| intel | xeon_e3-1225_v5_firmware | - | |
| intel | xeon_e3-1225_v5 | - | |
| intel | xeon_e3-1220_v5_firmware | - | |
| intel | xeon_e3-1220_v5 | - | |
| intel | xeon_e3-1535m_v6_firmware | - | |
| intel | xeon_e3-1535m_v6 | - | |
| intel | xeon_e3-1505m_v6_firmware | - | |
| intel | xeon_e3-1505m_v6 | - | |
| intel | xeon_e3-1505l_v6_firmware | - | |
| intel | xeon_e3-1505l_v6 | - | |
| intel | xeon_e3-1501l_v6_firmware | - | |
| intel | xeon_e3-1501l_v6 | - | |
| intel | xeon_e3-1501m_v6_firmware | - | |
| intel | xeon_e3-1501m_v6 | - | |
| intel | xeon_e3-1285_v6_firmware | - | |
| intel | xeon_e3-1285_v6 | - | |
| intel | xeon_e3-1280_v6_firmware | - | |
| intel | xeon_e3-1280_v6 | - | |
| intel | xeon_e3-1275_v6_firmware | - | |
| intel | xeon_e3-1275_v6 | - | |
| intel | xeon_e3-1270_v6_firmware | - | |
| intel | xeon_e3-1270_v6 | - | |
| intel | xeon_e3-1245_v6_firmware | - | |
| intel | xeon_e3-1245_v6 | - | |
| intel | xeon_e3-1240_v6_firmware | - | |
| intel | xeon_e3-1240_v6 | - | |
| intel | xeon_e3-1230_v6_firmware | - | |
| intel | xeon_e3-1230_v6 | - | |
| intel | xeon_e3-1225_v6_firmware | - | |
| intel | xeon_e3-1225_v6 | - | |
| intel | xeon_e3-1220_v6_firmware | - | |
| intel | xeon_e3-1220_v6 | - | |
| intel | xeon_e-2288g_firmware | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2286m_firmware | - | |
| intel | xeon_e-2286m | - | |
| intel | xeon_e-2286g_firmware | - | |
| intel | xeon_e-2286g | - | |
| intel | xeon_e-2278gel_firmware | - | |
| intel | xeon_e-2278gel | - | |
| intel | xeon_e-2278ge_firmware | - | |
| intel | xeon_e-2278ge | - | |
| intel | xeon_e-2278g_firmware | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2276ml_firmware | - | |
| intel | xeon_e-2276ml | - | |
| intel | xeon_e-2276me_firmware | - | |
| intel | xeon_e-2276me | - | |
| intel | xeon_e-2276m_firmware | - | |
| intel | xeon_e-2276m | - | |
| intel | xeon_e-2276g_firmware | - | |
| intel | xeon_e-2276g | - | |
| intel | xeon_e-2274g_firmware | - | |
| intel | xeon_e-2274g | - | |
| intel | xeon_e-2254ml_firmware | - | |
| intel | xeon_e-2254ml | - | |
| intel | xeon_e-2254me_firmware | - | |
| intel | xeon_e-2254me | - | |
| intel | xeon_e-2246g_firmware | - | |
| intel | xeon_e-2246g | - | |
| intel | xeon_e-2244g_firmware | - | |
| intel | xeon_e-2244g | - | |
| intel | xeon_e-2236_firmware | - | |
| intel | xeon_e-2236 | - | |
| intel | xeon_e-2234_firmware | - | |
| intel | xeon_e-2234 | - | |
| intel | xeon_e-2226ge_firmware | - | |
| intel | xeon_e-2226ge | - | |
| intel | xeon_e-2226g_firmware | - | |
| intel | xeon_e-2226g | - | |
| intel | xeon_e-2224_firmware | - | |
| intel | xeon_e-2224 | - | |
| intel | xeon_e-2224g_firmware | - | |
| intel | xeon_e-2224g | - | |
| intel | xeon_e-2186g_firmware | - | |
| intel | xeon_e-2186g | - | |
| intel | xeon_e-2186m_firmware | - | |
| intel | xeon_e-2186m | - | |
| intel | xeon_e-2176g_firmware | - | |
| intel | xeon_e-2176g | - | |
| intel | xeon_e-2176m_firmware | - | |
| intel | xeon_e-2176m | - | |
| intel | xeon_e-2174g_firmware | - | |
| intel | xeon_e-2174g | - | |
| intel | xeon_e-2146g_firmware | - | |
| intel | xeon_e-2146g | - | |
| intel | xeon_e-2144g_firmware | - | |
| intel | xeon_e-2144g | - | |
| intel | xeon_e-2136_firmware | - | |
| intel | xeon_e-2136 | - | |
| intel | xeon_e-2134_firmware | - | |
| intel | xeon_e-2134 | - | |
| intel | xeon_e-2126g_firmware | - | |
| intel | xeon_e-2126g | - | |
| intel | xeon_e-2124_firmware | - | |
| intel | xeon_e-2124 | - | |
| intel | xeon_e-2124g_firmware | - | |
| intel | xeon_e-2124g | - | |
| intel | xeon_e-2288g_firmware | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2286m_firmware | - | |
| intel | xeon_e-2286m | - | |
| intel | xeon_e-2286g_firmware | - | |
| intel | xeon_e-2286g | - | |
| intel | xeon_e-2278gel_firmware | - | |
| intel | xeon_e-2278gel | - | |
| intel | xeon_e-2278ge_firmware | - | |
| intel | xeon_e-2278ge | - | |
| intel | xeon_e-2278g_firmware | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2276ml_firmware | - | |
| intel | xeon_e-2276ml | - | |
| intel | xeon_e-2276me_firmware | - | |
| intel | xeon_e-2276me | - | |
| intel | xeon_e-2276m_firmware | - | |
| intel | xeon_e-2276m | - | |
| intel | xeon_e-2276g_firmware | - | |
| intel | xeon_e-2276g | - | |
| intel | xeon_e-2274g_firmware | - | |
| intel | xeon_e-2274g | - | |
| intel | xeon_e-2254ml_firmware | - | |
| intel | xeon_e-2254ml | - | |
| intel | xeon_e-2254me_firmware | - | |
| intel | xeon_e-2254me | - | |
| intel | xeon_e-2246g_firmware | - | |
| intel | xeon_e-2246g | - | |
| intel | xeon_e-2244g_firmware | - | |
| intel | xeon_e-2244g | - | |
| intel | xeon_e-2236_firmware | - | |
| intel | xeon_e-2236 | - | |
| intel | xeon_e-2234_firmware | - | |
| intel | xeon_e-2234 | - | |
| intel | xeon_e-2226ge_firmware | - | |
| intel | xeon_e-2226ge | - | |
| intel | xeon_e-2226g_firmware | - | |
| intel | xeon_e-2226g | - | |
| intel | xeon_e-2224_firmware | - | |
| intel | xeon_e-2224 | - | |
| intel | xeon_e-2224g_firmware | - | |
| intel | xeon_e-2224g | - | |
| intel | xeon_e-2186g_firmware | - | |
| intel | xeon_e-2186g | - | |
| intel | xeon_e-2186m_firmware | - | |
| intel | xeon_e-2186m | - | |
| intel | xeon_e-2176g_firmware | - | |
| intel | xeon_e-2176g | - | |
| intel | xeon_e-2176m_firmware | - | |
| intel | xeon_e-2176m | - | |
| intel | xeon_e-2174g_firmware | - | |
| intel | xeon_e-2174g | - | |
| intel | xeon_e-2146g_firmware | - | |
| intel | xeon_e-2146g | - | |
| intel | xeon_e-2144g_firmware | - | |
| intel | xeon_e-2144g | - | |
| intel | xeon_e-2136_firmware | - | |
| intel | xeon_e-2136 | - | |
| intel | xeon_e-2134_firmware | - | |
| intel | xeon_e-2134 | - | |
| intel | xeon_e-2126g_firmware | - | |
| intel | xeon_e-2126g | - | |
| intel | xeon_e-2124_firmware | - | |
| intel | xeon_e-2124 | - | |
| intel | xeon_e-2124g_firmware | - | |
| intel | xeon_e-2124g | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37ED0DB6-A589-4CB7-87AD-102FE7490AC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EB3692-06DA-4EED-8F5E-D21ECC9EEDEE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20EE53DA-4639-4714-B956-CC69BBCC6D26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A86F4A2B-B4B4-42E2-8D5D-E31D06456C76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237D4E3F-F132-4D6E-95F8-C607EC09CB50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6484B4DA-85FA-4BF9-9B4A-157BC2ED2889",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A91E832-9A60-4552-9388-DA779F9C4A9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34D8B71-549C-400A-976F-AA170F1D7B08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A0BDFFB-638F-4FB7-A43A-812874D8774A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1912C4B-2371-463E-868C-3C35050E2A06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46994C87-8D86-4699-8257-DFAB90D08A09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDCB2FA-B3D8-4922-B8B5-7FAA4A574D0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE88726F-B548-4FF1-8E76-90DD6CFC12E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DD0B86-37A4-4927-97C5-86B165590105",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8851E2-CD05-4575-83E3-F801C1785A59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB96985-BB1A-4F60-8259-E3AD4ACAD8CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CFAE743-376B-4FD1-8391-664D97667105",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C00E0312-D1D1-410D-A3A1-74495AA1C2C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43CEC4C5-B559-4A48-A1D2-7CDB96381CCB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F72876C5-C084-4DD3-9BC8-894C4BE40C15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53B450C9-CDC4-4047-AD77-19A4BC9CB870",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80A4E442-8E2C-472B-A9C6-56B58B6B55B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43695191-7897-4028-A8DA-F45D2B4E0C38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E88CE3A-812A-4C01-B0D7-D9A154FF2187",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C70D1724-ED58-4675-9A53-F7473D77638B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8BAD9D-7253-492A-87B3-CACCF66A332F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "988EDA03-EF3B-402F-B3B4-74BA32A1BCCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65ABD229-0EF3-44AC-AD87-6C42EF48BF2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFC1253-B337-4F9B-855D-14A3F6AE7EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E61BD341-9D1F-444C-A5C9-761994866ED2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77C3D738-944D-46A1-A542-32C96A021964",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A20E7888-D3A3-4A01-8328-71A81AA0A52A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45D72230-B7C2-4A9C-928F-328666CA3988",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16807D5E-1E13-4A98-8217-9AF6CE24A933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54606FA5-02CE-43C5-9153-FB1070E9DD15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B60A1C2-D6E2-43B3-967C-746CDC2F96CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "942B77AD-CEA4-4A9F-B748-155916A4917A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "581CCD85-F9BA-4AE0-8FCD-4118C13C1080",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C365D42-1DEA-4FF2-86E4-1CC27E52E40E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3625E5-4583-4F38-B6E3-68FD20E54ACB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "455BC769-5B19-4B91-844B-15B4FB2401E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FD2F07-6CD0-4708-8D11-3BA0AEFD5271",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "419680D5-21E0-491C-98AA-9D079213A020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1163CF40-4D70-4965-8229-B102D754ECD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "199A5D61-EB42-4C3C-9344-4CA497358D7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "662A5846-DA15-431B-9392-F0BA5457FDE6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7CD68D-6177-4F61-ABAF-C88453BD6C52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "216DE05B-001E-47FE-B35A-55319B095853",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A6C110-BE1A-4D3E-A048-D63F4F64B1E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D19BB027-D927-4D06-A580-6C6E3E077B7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA4F635-86BE-409A-A619-9EEA4C4B4FBA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F981A8EE-13BB-42C2-91D0-631247A03CB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A3CE35-5572-4355-B063-08DA49917126",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8F7DCA-3FA7-4943-9458-13695F529BBA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C619D6-6275-465E-9023-25EEFC298711",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "077BFDB3-CACE-4600-8ABE-DE079EDA8D6E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A49E7867-14E6-4DB4-93D8-A108996F7B75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8925FB8-D645-4DE0-A37A-4BCAEA1EBE08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE1171D-9B4E-4134-8489-F44B2912E310",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28E61222-34B1-47AB-806F-DAAA4B41BD45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E257946A-458F-4F27-8387-9CF4DB8193FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919FA36-0AB9-4D42-B33F-7795BD7601BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1746995D-CCA1-4858-87C5-8E2DC51FDA75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7ABA76A-91AE-4524-9013-2BF843FFB5DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47759461-35C3-4F77-9D96-B4929075CC17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3760BA20-5E0D-460C-BDD5-6E456646D814",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "030F2C9A-E9F8-4B29-857A-B6A895C54A61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5111864-B660-4603-BC03-94A719C8D2EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE48BFF-CCB4-423D-968C-013060E447E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C056C18D-457C-4216-8B91-84A4628DE44E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1273C6-1F76-4366-88A2-A3955CB1CE3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9BABD0-E0D7-4D9D-B998-0FB23612E7BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17F6A70D-4925-49A7-BFE9-A1B7F2CD6FF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6185880A-E648-46C3-B14E-42DB61113C59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65F8523D-BA5F-4BD8-A15F-A49B12001986",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE98CB9-14D8-4297-807B-33F9B376D37B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B02BC8-A29C-48B9-B66C-2BD9C241DFD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3214D779-E335-4141-882F-CBB3A3317CDE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A393CA-35AB-4F8D-9A33-9693905DA445",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39616E34-9182-485B-B6AE-566DE2E77AA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F68C14E0-5711-4D18-B529-AA0EE3BDC99C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFD79A0-2F24-484C-AD4A-D58B7414788E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE469B71-77FC-4940-AF10-631D73DEF18A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6609BC-7E90-41F9-91A3-4139100D7A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC07C3B-8ECF-4BF1-A08D-907319EFFC34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EEEF17-0881-448C-A984-D5EFCB0F68EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36FAB23F-A289-42E6-BA8E-C4A061A9604C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39616E34-9182-485B-B6AE-566DE2E77AA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F68C14E0-5711-4D18-B529-AA0EE3BDC99C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFD79A0-2F24-484C-AD4A-D58B7414788E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE469B71-77FC-4940-AF10-631D73DEF18A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6609BC-7E90-41F9-91A3-4139100D7A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC07C3B-8ECF-4BF1-A08D-907319EFFC34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EEEF17-0881-448C-A984-D5EFCB0F68EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36FAB23F-A289-42E6-BA8E-C4A061A9604C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Una protecci\u00f3n insuficiente de la memoria en Intel\u00ae 6th Generation Core Processors y superiores, compatibles con SGX, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local."
}
],
"id": "CVE-2019-0123",
"lastModified": "2024-11-21T04:16:16.720",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-14T20:15:11.290",
"references": [
{
"source": "secure@intel.com",
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K81556107?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.