Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-12987 (GCVE-0-2020-12987)
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-17 01:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NA
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:11:19.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AMD Radeon Software",
"vendor": "AMD",
"versions": [
{
"lessThan": "20.7.1",
"status": "affected",
"version": "Radeon Software",
"versionType": "custom"
},
{
"lessThan": "21.Q2",
"status": "affected",
"version": "Radeon Pro Software for Enterprise",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-11-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NA",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-27T18:17:38",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
}
],
"source": {
"advisory": "AMD-SB-1000",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
"ID": "CVE-2020-12987",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AMD Radeon Software",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Radeon Software",
"version_value": "20.7.1"
},
{
"version_affected": "\u003c",
"version_name": "Radeon Pro Software for Enterprise",
"version_value": "21.Q2"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NA"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
}
]
},
"source": {
"advisory": "AMD-SB-1000",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2020-12987",
"datePublished": "2021-06-11T21:50:16.210991Z",
"dateReserved": "2020-05-15T00:00:00",
"dateUpdated": "2024-09-17T01:02:07.506Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-12987\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2021-06-11T22:15:11.570\",\"lastModified\":\"2024-11-21T05:00:37.227\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de direcci\u00f3n de grupo de kernel/fuga de pila en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una omisi\u00f3n de KASLR\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*\",\"versionEndExcluding\":\"21.q1\",\"matchCriteriaId\":\"CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.7.1\",\"matchCriteriaId\":\"528B8908-B68E-40A1-9EB8-8EBD287DC8F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"084984D5-D241-497B-B118-50C6C1EAD468\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*\",\"matchCriteriaId\":\"BA592626-F17C-4F46-823B-0947D102BBD2\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
fkie_cve-2020-12987
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | radeon_pro_software | * | |
| amd | radeon_software | * | |
| microsoft | windows_10 | - | |
| microsoft | windows_10 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
"versionEndExcluding": "21.q1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
"versionEndExcluding": "20.7.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
},
{
"lang": "es",
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de direcci\u00f3n de grupo de kernel/fuga de pila en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una omisi\u00f3n de KASLR"
}
],
"id": "CVE-2020-12987",
"lastModified": "2024-11-21T05:00:37.227",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-11T22:15:11.570",
"references": [
{
"source": "psirt@amd.com",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2020-12987
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-12987",
"description": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
"id": "GSD-2020-12987"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-12987"
],
"details": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
"id": "GSD-2020-12987",
"modified": "2023-12-13T01:21:49.730942Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
"ID": "CVE-2020-12987",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AMD Radeon Software ",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Radeon Software",
"version_value": "20.7.1"
},
{
"version_affected": "\u003c",
"version_name": "Radeon Pro Software for Enterprise ",
"version_value": "21.Q2 "
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NA"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
}
]
},
"source": {
"advisory": "AMD-SB-1000",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
"cpe_name": [],
"versionEndExcluding": "21.q1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "20.7.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-12987"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-12-30T20:38Z",
"publishedDate": "2021-06-11T22:15Z"
}
}
}
CERTFR-2021-AVI-858
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel® NUC Kit: NUC8i7HNK, NUC8i7HVK | ||
| Intel | N/A | Intel® Pentium® Processor N Series | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series | ||
| Intel | N/A | Intel® NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7 | ||
| Intel | N/A | 700-series Ethernet Adapters | ||
| Intel | N/A | Intel SSD DC P4608 Series toutes versions. | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC710. | ||
| Intel | N/A | Intel® NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Pentium® Silver Processor Series | ||
| Intel | N/A | Intel® P4510 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX210 | ||
| Intel | N/A | All Intel® oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions antérieures à 2021.1 Beta 10. | ||
| Intel | N/A | Intel® Pentium® Processor J Series, N Series | ||
| Intel | N/A | Intel SSD DC P4600 Series toutes versions. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3168 | ||
| Intel | N/A | Safestring library maintained by Intel® avant le commit avec l'id efbd4066ea215f03342c1f0e5888102badf14477 | ||
| Intel | N/A | Intel® NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W | ||
| Intel | N/A | Intel® P4618 series versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Ethernet 500 Series Controllers driver pour Linux versions antérieures à 3.17.3. | ||
| Intel | N/A | Intel® NUC Kit: NUC6CAYH, NUC6CAYS | ||
| Intel | N/A | Intel® NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA | ||
| Intel | N/A | Intel® Wi-Fi 6 AX201 | ||
| Intel | N/A | 10th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8265 | ||
| Intel | N/A | Intel® Distribution of OpenVINO™ Toolkit versions antérieures à 2021.4. | ||
| Intel | N/A | Intel SSD D5-P4420 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Kit - NUC11PHKi7C | ||
| Intel | N/A | Intel® RealSense™ D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.22. | ||
| Intel | N/A | Intel® oneAPI Rendering Toolkit versions antérieures à 2021.2. | ||
| Intel | N/A | Intel® Wireless-AC 9462 | ||
| Intel | N/A | Intel® P4511 series (M.2) versions antérieures à VDV10384. | ||
| Intel | N/A | Intel® Serial IO driver pour Intel® NUC 11 Gen versions antérieures à 30.100.2104.1. | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNKTC | ||
| Intel | N/A | Intel® P4510 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC | ||
| Intel | N/A | Intel® Wireless-AC 9560 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit: LAPBC510, LAPBC710 | ||
| Intel | N/A | Intel® NUC 8 Rugged Kit NUC8CCHKR | ||
| Intel | N/A | Intel® Wi-Fi 6E AX210 | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA | ||
| Intel | N/A | Intel® NUC Kit NUC7i3DNHE, NUC7i3DNKE | ||
| Intel | N/A | 7th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® Graphics Driver pour Windows® 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions antérieures à 21.10. | ||
| Intel | N/A | Intel® NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA | ||
| Intel | N/A | Intel® Xeon® Processor W Family | ||
| Intel | N/A | Intel® Atom® Processor A Series | ||
| Intel | N/A | Intel® EMA versions antérieures à 1.5.0. | ||
| Intel | N/A | Intel® Ethernet Diagnostic Driver pour Windows versions antérieures à 1.4.0.10. | ||
| Intel | N/A | Intel® Wireless 7265 (Rev D) Family | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW | ||
| Intel | N/A | Intel® NUC Board NUC8CCHB | ||
| Intel | N/A | Intel® Graphics non DCH Drivers pour Windows 10 versions antérieures à 100.9416. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver installer pour Windows versions antérieures à 1.4.0.21. | ||
| Intel | N/A | Intel® P4511 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Killer™ Wi-Fi 6 AX1650 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions antérieures à 1.78.4.0.4. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX200 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC510. | ||
| Intel | N/A | Intel® NUC Board NUC7i3DNBE | ||
| Intel | N/A | Intel® NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB | ||
| Intel | N/A | Killer™ Wireless-AC 1550 | ||
| Intel | N/A | Intel® NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7 | ||
| Intel | N/A | Intel® NUC 8 Home, a Mini PC avec Windows® 10: NUC8i3CYSM, NUC8i3CYSN | ||
| Intel | N/A | 3rd Generation Intel® Xeon® Scalable Processors | ||
| Intel | N/A | Intel SSD D7-P5608 Series versions antérieures à 2CV1R106. | ||
| Intel | N/A | Intel® Celeron® Processor J Series, N Series | ||
| Intel | N/A | Intel® NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB | ||
| Intel | N/A | Intel® Atom® Processor E3900 Series | ||
| Intel | N/A | Intel® SSD DC D4512 versions antérieures à ET10. | ||
| Intel | N/A | Intel® Core™ X-series Processors | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Wireless-AC 9260 | ||
| Intel | N/A | Intel® Graphics DCH Drivers pour Windows 10 versions antérieures à 27.20.100.9316. | ||
| Intel | N/A | Intel® NUC 8 Pro Board NUC8i3PNB | ||
| Intel | N/A | Intel® SSD D3-S4510 Series (SFF, M.2) versions antérieures à XCV10140. | ||
| Intel | N/A | Killer™ Wi-Fi 6E AX1675 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions antérieures à 1.78.1.1. | ||
| Intel | N/A | Intel® P4610 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Wireless-AC 9461 | ||
| Intel | N/A | Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 août 2021. | ||
| Intel | N/A | Intel® NUC 7 Essential, a Mini PC avec Windows® 10 - NUC7CJYSAL | ||
| Intel | N/A | Intel® VTune™ Profiler versions antérieures à 2021.3.0. | ||
| Intel | N/A | Intel® NUC Kit: NUC7CJYH, NUC7PJYH | ||
| Intel | N/A | 11th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel SSD DC P4500 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK | ||
| Intel | N/A | Intel SSD D5-P4326 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4501 Series toutes versions. | ||
| Intel | N/A | Intel® Thunderbolt™ 3 and 4 Windows DCH Drivers versions antérieures à 1.41.1054.0 | ||
| Intel | N/A | Intel® Celeron® Processor N Series | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNHNC | ||
| Intel | N/A | Intel® Core™ i7-8706G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel SSD D5-P4320 Series toutes versions. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver pour Windows versions antérieures à 1.4.0.15. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8260 | ||
| Intel | N/A | Intel® Battery Life Diagnostic Tool versions antérieures à 1.2. | ||
| Intel | N/A | Intel® NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA | ||
| Intel | N/A | Intel® NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX | ||
| Intel | N/A | Intel SSD D7-P5500 Series versions antérieures à 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029. | ||
| Intel | N/A | Intel® Xeon® Processor E3 v6 Family | ||
| Intel | N/A | Intel® oneAPI Base Toolkit versions antérieures à 2021.4.0. | ||
| Intel | N/A | Intel® Thunderbolt™ non-DCH Driver toutes versions pour Windows. | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE | ||
| Intel | N/A | Intel® Xeon® Processor E Family | ||
| Intel | N/A | Intel SSD D7-P5600 Series versions antérieures à 1.2.0, 2CV1L029 and 2CV1C030. | ||
| Intel | N/A | Intel® Atom® Processor C3000 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3165 | ||
| Intel | N/A | 810-series Ethernet Adapters | ||
| Intel | N/A | Intel® Iris® Xe MAX Dedicated Graphics Drivers pour Windows 10 versions antérieures à 27.20.100.9466. | ||
| Intel | N/A | Intel® Core™ i5-8305G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series - Refresh | ||
| Intel | N/A | Intel® NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7 |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel\u00ae NUC Kit: NUC8i7HNK, NUC8i7HVK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "700-series Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4608 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC710.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Silver Processor Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4510 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "All Intel\u00ae oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions ant\u00e9rieures \u00e0 2021.1 Beta 10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor J Series, N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4600 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 3168",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Safestring library maintained by Intel\u00ae avant le commit avec l\u0027id efbd4066ea215f03342c1f0e5888102badf14477",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4618 series versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Ethernet 500 Series Controllers driver pour Linux versions ant\u00e9rieures \u00e0 3.17.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC6CAYH, NUC6CAYS",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX201",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "10th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 8265",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Distribution of OpenVINO\u2122 Toolkit versions ant\u00e9rieures \u00e0 2021.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4420 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Enthusiast Kit - NUC11PHKi7C",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae RealSense\u2122 D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.22.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae oneAPI Rendering Toolkit versions ant\u00e9rieures \u00e0 2021.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9462",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4511 series (M.2) versions ant\u00e9rieures \u00e0 VDV10384.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Serial IO driver pour Intel\u00ae NUC 11 Gen versions ant\u00e9rieures \u00e0 30.100.2104.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNKTC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4510 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9560",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit: LAPBC510, LAPBC710",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Rugged Kit NUC8CCHKR",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6E AX210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit NUC7i3DNHE, NUC7i3DNKE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "7th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics Driver pour Windows\u00ae 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor W Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae EMA versions ant\u00e9rieures \u00e0 1.5.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Ethernet Diagnostic Driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless 7265 (Rev D) Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Board NUC8CCHB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics non DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 100.9416.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver installer pour Windows versions ant\u00e9rieures \u00e0 1.4.0.21.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4511 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wi-Fi 6 AX1650",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions ant\u00e9rieures \u00e0 1.78.4.0.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX200",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC510.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Board NUC7i3DNBE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wireless-AC 1550",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Home, a Mini PC avec Windows\u00ae 10: NUC8i3CYSM, NUC8i3CYSN",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5608 Series versions ant\u00e9rieures \u00e0 2CV1R106.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Celeron\u00ae Processor J Series, N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor E3900 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae SSD DC D4512 versions ant\u00e9rieures \u00e0 ET10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 X-series Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9260",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9316.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Pro Board NUC8i3PNB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae SSD D3-S4510 Series (SFF, M.2) versions ant\u00e9rieures \u00e0 XCV10140.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wi-Fi 6E AX1675",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.1.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4610 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9461",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 ao\u00fbt 2021.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Essential, a Mini PC avec Windows\u00ae 10 - NUC7CJYSAL",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2021.3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC7CJYH, NUC7PJYH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "11th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4500 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4326 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4501 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Thunderbolt\u2122 3 and 4 Windows DCH Drivers versions ant\u00e9rieures \u00e0 1.41.1054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Celeron\u00ae Processor N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNHNC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 i7-8706G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4320 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.15.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 8260",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 1.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5500 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor E3 v6 Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2021.4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Thunderbolt\u2122 non-DCH Driver toutes versions pour Windows.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor E Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5600 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1L029 and 2CV1C030.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor C3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 3165",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "810-series Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Iris\u00ae Xe MAX Dedicated Graphics Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9466.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 i5-8305G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b - Refresh",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0063"
},
{
"name": "CVE-2020-12981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12981"
},
{
"name": "CVE-2020-12987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12987"
},
{
"name": "CVE-2021-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0157"
},
{
"name": "CVE-2020-12899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12899"
},
{
"name": "CVE-2021-33062",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33062"
},
{
"name": "CVE-2021-0199",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
},
{
"name": "CVE-2021-33089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33089"
},
{
"name": "CVE-2020-12986",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12986"
},
{
"name": "CVE-2021-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0135"
},
{
"name": "CVE-2021-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0065"
},
{
"name": "CVE-2021-0078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0078"
},
{
"name": "CVE-2020-8741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8741"
},
{
"name": "CVE-2021-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0053"
},
{
"name": "CVE-2021-33106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33106"
},
{
"name": "CVE-2021-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
},
{
"name": "CVE-2021-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0096"
},
{
"name": "CVE-2021-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0158"
},
{
"name": "CVE-2021-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33092"
},
{
"name": "CVE-2020-12983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12983"
},
{
"name": "CVE-2021-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0082"
},
{
"name": "CVE-2021-0079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0079"
},
{
"name": "CVE-2021-33094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33094"
},
{
"name": "CVE-2021-33090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33090"
},
{
"name": "CVE-2020-12893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12893"
},
{
"name": "CVE-2020-12982",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12982"
},
{
"name": "CVE-2021-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0071"
},
{
"name": "CVE-2020-12980",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12980"
},
{
"name": "CVE-2021-33095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33095"
},
{
"name": "CVE-2020-12963",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12963"
},
{
"name": "CVE-2021-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0151"
},
{
"name": "CVE-2020-12902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12902"
},
{
"name": "CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"name": "CVE-2021-33118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33118"
},
{
"name": "CVE-2021-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0148"
},
{
"name": "CVE-2021-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0121"
},
{
"name": "CVE-2021-33071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33071"
},
{
"name": "CVE-2021-33105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33105"
},
{
"name": "CVE-2021-33058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33058"
},
{
"name": "CVE-2021-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
},
{
"name": "CVE-2021-33097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33097"
},
{
"name": "CVE-2020-12898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12898"
},
{
"name": "CVE-2021-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0152"
},
{
"name": "CVE-2021-0069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0069"
},
{
"name": "CVE-2021-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
},
{
"name": "CVE-2020-12901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12901"
},
{
"name": "CVE-2021-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0013"
},
{
"name": "CVE-2020-12985",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12985"
},
{
"name": "CVE-2020-12892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12892"
},
{
"name": "CVE-2021-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0075"
},
{
"name": "CVE-2021-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0120"
},
{
"name": "CVE-2021-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0146"
},
{
"name": "CVE-2020-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12900"
},
{
"name": "CVE-2021-33087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33087"
},
{
"name": "CVE-2021-33086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33086"
},
{
"name": "CVE-2020-12904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12904"
},
{
"name": "CVE-2021-33091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33091"
},
{
"name": "CVE-2021-33059",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33059"
},
{
"name": "CVE-2021-33088",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33088"
},
{
"name": "CVE-2021-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0064"
},
{
"name": "CVE-2020-12897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12897"
},
{
"name": "CVE-2020-12894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12894"
},
{
"name": "CVE-2020-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12905"
},
{
"name": "CVE-2021-33063",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33063"
},
{
"name": "CVE-2020-12903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12903"
},
{
"name": "CVE-2021-33073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33073"
},
{
"name": "CVE-2021-33093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33093"
},
{
"name": "CVE-2021-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0110"
},
{
"name": "CVE-2020-12964",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12964"
},
{
"name": "CVE-2020-12895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12895"
}
],
"initial_release_date": "2021-11-10T00:00:00",
"last_revision_date": "2021-11-10T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-858",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00393 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00393.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00560 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00481 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00551 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00551.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00535 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00535.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00565 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00565.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00524 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00567 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00528 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00547 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00562 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00584 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00584.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00556 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00569 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00557 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00540 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00533 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00555 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00509 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00564 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00564.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00538 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00538.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00554 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00568 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00566 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00482 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…