Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-0127 (GCVE-0-2021-0127)
Vulnerability from cvelistv5
- denial of service
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Processors | Version: See references | 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.556Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-0127",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T13:21:55.611621Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "NVD-CWE-Other",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-05T17:00:19.518Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-10T09:06:28.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0127",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20220210-0008/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0127",
    "datePublished": "2022-02-09T22:04:16.000Z",
    "dateReserved": "2020-10-22T00:00:00.000Z",
    "dateUpdated": "2025-05-05T17:00:19.518Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-0127\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2022-02-09T23:15:13.817\",\"lastModified\":\"2025-05-05T17:16:42.773\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.\"},{\"lang\":\"es\",\"value\":\"Una administraci\u00f3n no suficiente del flujo de control en algunos procesadores Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por acceso local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4003B029-36AE-47CD-BFB1-1F06DFEBA0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF19F8-54BB-4BF4-BF1C-515EBBEE2060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67D44E3-F8E1-4EB9-8D91-5777DC97D497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4AC5E9-94DB-4970-BE29-747503AE81E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FFA194-E200-4F4D-8E66-60D0134184E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B950F6FC-2848-45B7-9C28-B0DF46BC442B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABDC4948-B063-4327-890A-C8D9F955C7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95101653-A2BF-47F5-A209-097CA98A91F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226CBC16-EC2A-4498-ADB3-655A0E9CF396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9278297-5E4B-40D0-8782-E5AE87E43B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF64D95C-653A-4864-A572-CD0A64B6CDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B2F570-1DD9-49C7-BB72-0EA0E9A417C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F751905-287E-47EA-93B8-2BA576052AAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614B1B4E-E1D7-417F-86D1-92F75D597E36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD11E86-B786-43C8-9B67-8F680CC30451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D740D69-83B6-4DBF-8617-9B1E96DFF4FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9963C9F-2D15-479A-A6C1-0C9863904B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B15567-BFEA-43BE-9817-98A1F5548541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"984C7C7A-2F8E-4918-8526-64A080943E0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43454510-4BE7-4CD1-960D-AE1B36EFBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AFC285-2248-45E7-9009-1402628F17E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"078DAE1F-8581-44FB-83EA-575685928C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887BEC29-AD0D-4BEB-B50B-F961629BBF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93859A03-DE41-4E7B-8646-93925ACBFC42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9877F278-641B-4F83-B420-AB4E1018EA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C60AF0D-983D-454E-8940-209C471DC041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BAF09D-8199-4579-B25A-E7C5177385E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EA30AA-713F-40AD-8C94-C1129198EE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114DF43C-839F-4066-AA30-8DC16B1D6687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B47568A4-117D-4E76-88DA-F8A4139A83D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F3324D-6E58-4233-A0C4-4F2C058E8D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6E16A4-5B81-412F-9B02-D15288F0EB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8448F47A-F956-4228-9A13-24AE86C532CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C4115F-E374-47E9-A81F-CC06FA72C67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE81958E-5DFA-424C-9662-ECB1D9B738D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0F2403-8146-4CA0-9E89-04022B375CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD67C284-EFCE-4530-8E68-42BB1B6F15C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C38AF3E-4547-4CA3-9078-6CBD372331AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B1E424-885F-4BB0-9257-8284A18B1655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BADEBE08-1478-4B88-9E06-5164BA0517DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D672383-B9AD-466E-8D6C-68DEC432B9A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D16BDFF3-4CC0-4423-8385-C5E49C941F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F2CA68-9EEA-421F-A92E-E7685EC010EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC9F763B-B469-42DC-952F-48448121373F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C17DCC3-9200-4198-B08D-EAD531B59995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CBD3FB-0835-4F28-BFA2-3D07459066F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6B298A-1480-41C2-BE7C-7291E7256D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14C20D2A-CD26-4019-A266-AB4E89EBD2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B608F333-BD78-4082-B2AE-0F5BBE7E0D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F609E73-203F-45B9-9A3A-DC754B33860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3A734E-973B-4904-A905-51E438879B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF355B2-A5D6-41CC-8404-2B61A594BA6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E86321B-B1BD-43B7-A7F5-05CABE35F40E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD84789A-B7F4-493E-A3F6-D5287ACFEB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A504EF6-8F7D-4839-B16D-FDCBD3B22287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B28199-5B9A-4AC4-9529-77A6FC591DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B0B0C9-54ED-4D7E-B0F2-C87690056800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6287BCB7-8EFD-485E-B40E-AE6B9DB067DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25227F52-7398-4E68-A973-B9177886BE0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78093B-076C-48FB-A224-F94F5743ACF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B230FB82-C498-4118-97D3-3835CB713E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1DCD6D7-7FF2-419B-A41C-CF1FA830F289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8127E47-6082-4313-B310-1C6278471A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14BA084-59CC-40E8-A62F-7AD1C9DD9283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89E9DCEC-6AFD-476F-93A1-E19BFC124BD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5523F4AF-8CCF-41B1-ADC8-D8363CE0A9D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53F1B439-37B2-4425-8359-D3C86CD76BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A121388-F0FF-420E-98E2-B6F4B53FF88F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83D5E36-BCA6-47A6-9C78-5A5FAD89F95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA88723-29A0-4F7C-BED3-70E35F913384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B0AC6F-52DC-4697-A29A-B4DE51B41D57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64206B12-9CB6-4E4F-9200-EE062693FC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98752CBB-B870-4DA2-BF09-0A6A847E7F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71615EAF-4DF4-4B9E-BF34-6ED0371A53D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376B6DD7-1284-4BD9-88A4-5C34303CC5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403E8A3A-28C2-4329-BF31-1A530E317959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F6F725-217C-48FF-86DD-E91A24156121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365696BF-CE3D-4CE6-92A8-413DDE43774E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F3DE58-EC72-429F-A223-F2027D2828AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8515D29-3823-4F9B-9578-8BB52336A2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE048AEB-094D-4102-9DBF-488FEB53FF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E6B9500-2C37-48D5-A0BA-A159D04AC6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF497A0-30BC-42A4-A000-C0D564D4872A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3025301-52D3-43D7-B6AB-F3F0A5C882DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466A6CC-8D69-4EB5-94E2-611297120462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D116C4-698B-45BC-8622-87E142B37922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCA6E61-F1C9-4629-9068-545B19CF95E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36836EB0-99DD-4217-9182-1E9FC5656C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD507601-CD6D-4F11-A4A7-790FB740B401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C26205-C602-46F6-B611-424709325D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"464587A0-9EAA-4DF5-AFEB-15F2FA9CD407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1940F59A-67FD-45F9-9C78-51A50687628F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B722E2A-1262-44FD-8F7C-F9A9A5C78744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40E9EC2-A8A6-4800-9F9E-B1237832D6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158CC66D-32E5-4396-8E5D-4D90EE9AB62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84F0381-296A-408E-90D4-A316EE894A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092E3E45-5F58-412F-BAC9-C3B5290D8349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6FCAFC0-EEE2-43E4-AE90-1803588B5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8640175-3BC2-4C7B-A5A3-51E5677EDECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D902B5-D135-4961-AED9-EA6DF06534B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B858B433-9DA0-4224-B94C-4962FB3A4138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6B5FC3-8E55-430A-A55A-AF541690C576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55568460-F318-48FB-90E4-55CBBAF13E59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0242C717-1C3F-4D9E-B068-F3102A40E6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB84973-3DAC-4458-A817-943302F5EFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B26C730-32FA-4D51-88FA-E724147147BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF7C5BF-E151-42DB-B0CF-E2589904C9A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F611716-F3D6-4187-AE71-4FF87C95C18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F67974-81B3-43C2-8DAE-A66C6A876B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1054FBFC-1609-4301-A0D0-B78878FB2427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F889F1-3B57-46C1-9C23-9E78CD0DEECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93929C7B-D4D9-436B-BA69-FD3C22FCEC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F9109E-EADD-40F4-8360-BF7E37433E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F7C959-BC66-40AB-8038-D37181A4CE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9B3858-E58D-471E-8F12-DC109A133B81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D37104E-78E5-4368-B67F-1F8C63873C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F01770-A6AD-4F7B-8FD6-C066241A139B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFA368-60E2-42D7-9C59-04F61F1A1FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0974E563-6326-4E79-95FF-40625440696E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E904FB93-EFF6-4E8E-92F2-95C4952B0240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B232290-B3AD-4BB5-80B8-4CB3E6259A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2607AB1-D851-4D83-9198-5B9A148E9B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772568B9-C502-4154-9320-16D78BF60B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"912614A7-45BA-411D-AE77-610EFE8D2A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FBD651A-306D-4341-8DEE-2E928CA6E0EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D61E39-79F5-4606-B196-D79A9C2C738C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993BEE9-72BD-4615-B1BE-5E9129D61ABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA6BB38-CDF8-46B0-9910-897AB7920D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF244D02-2B47-4884-8D70-37DFEB18CB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE85AE7-B4BD-442E-AFAB-CD01744C91B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2425FF8A-158C-40EE-BDBF-43E7641BC058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA681B4-37F8-4E2E-B73B-E0E17C66B754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173C6F98-4022-4F40-A39A-D3D490CA6461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EACCCA-7ADB-40B8-87DD-A55313E5BB97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1BD53-55ED-4346-A67A-141B5BC552CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D7B5DF-716F-48E6-9445-BB56A620DEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3E6176-6F6D-4488-A03B-2BBF846ADC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF705120-459D-49BA-BDCD-6AC38D95C820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B91585C-4BD7-475B-8AC8-1B813A698D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B7093E-97DA-4BED-AE7C-87090B82E5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA675E6-83DD-47FF-BEBC-D32E5223A065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDA599F-09D5-4351-B7F5-351A2E04E091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D55B9D-4BAB-4082-A33F-626E15229333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E920376-561D-4892-97A2-F4400223B3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D350A92-3992-4464-84AB-960ABCA45698\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF02D685-1E67-40E1-A858-000498D5D877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8CE3D72-A3E6-4E8C-8673-D9265D66A449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC9F52F-6669-459A-A0A9-8F472E1F2761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E91B92-4DB7-4866-8370-C6F8616D3D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F465BF-4548-45EB-AC40-384F4E6248EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7950151-6BF6-4A80-9370-ED92B59635BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F7D93A-7C16-4189-ACF2-9B3760180FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A72E6F1-5A3C-4D8E-8F5F-0D92BC1CD8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A5BA20-2193-4C17-BBDC-8615D9333D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55240EF3-B56C-45DF-B868-6DF59A349E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26975700-3A56-4D17-ADDC-77CCE82A6C98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DFFFEB-CC63-4F51-8828-C5D4E0287264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B176D141-26B0-477E-B2DB-2E48D6FB82AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B9F540-DFCD-40B2-8DE2-9AE9D123A48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD97F84B-ED73-4FFD-8634-10631FEE03EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2243674B-E505-4FED-B063-953A1569EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA08C262-414E-401A-8F91-131626FA82A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1978F85-5BA5-468E-B797-7FA7EB4F489D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D3D0CA-C981-4091-99F9-203DA8F156F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB23D0C-D2BC-4E7F-94AF-CAF171A64307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC9312B-40A7-4D4A-A61C-3BA865C29F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EBECBE5-2BF0-4175-81CC-C6D054C819B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB33CC4F-9D51-4A11-B063-6E78F0D71555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA491401-C484-4F77-ABF8-D389C94BF7B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F8B600-B618-48E1-81EE-14A8A843F09F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42ADD367-82C8-4761-AEBA-A0200C5D1CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF75C0E-BA48-4C56-8398-109D06B5A5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25329A6F-9D49-4EA7-B9FB-8C2FA5343475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22921B65-513F-4ACE-80A2-4A31199BB5EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63719B1D-5A98-44E3-80D8-CF0B4C1C6F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5365D3B-1B0B-416D-ACFB-23843FD25EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2556EF0A-B29F-4E9E-BB77-955CBC851EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD253CF-55F8-4350-AD79-6CB5526DEB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5601E40A-96E1-4321-9682-055A1C607488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF36D9CC-2FD8-4D08-8712-E625D4754613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3252CF19-9D1D-4A46-9C94-0E7255CDDD8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11C7F38-3313-4F6D-9D5D-E61C89E716B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B0C976-3B68-4647-909A-5D574D711C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA18192E-7DBB-45BB-8568-CA7159AF8CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2FDB568-5340-4DD8-B933-1CD64C370BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12ADA9A2-6E64-4F17-B369-816639F0D3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"514B7B5E-D60D-464A-8CB0-273044FD2E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB608EE-83AF-4192-93E1-7DDBA5F6A54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4266C712-B84F-45AD-B108-C890E073FA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD9E14F8-2003-4D8F-A9E2-9633B478DBA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD5E62D8-BA9C-48F6-B3B6-18DCA83D8C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC77BD1C-BB51-4FE4-83A1-B69E6371B15A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DF4072-DD12-41CC-8E18-E178BA3C8A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF0F0769-A572-4C23-BDB4-647CAEA8BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E754A91A-7DBC-427B-A01F-9501D1A4668C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83610FBC-6D1E-465F-AFE3-625E951AE4E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4205855A-2A51-42EB-A5EF-4AD6DF409A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035563B3-4F45-4B12-9F2C-C8ED678232FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F296558-643A-40A8-AD03-A88F70AC121D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821873C-2F30-4D98-8570-5DDBDF5D3C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E6E09-671F-428A-A653-0E594FC2F5BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0133C635-7981-470D-ADB3-92A9C884F273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD248D-0B95-4BE1-917F-E0976447927D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5726D5D4-F188-4F06-B78A-2C7C694A40E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72467515-7793-479B-BABF-839275CA9AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B79264-C756-408C-A32A-BFD4AA0B20CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3DB891-40F6-4000-BEAE-A1710C70C43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3EA33F-D137-4B24-9211-C8A62A7427A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86FFF97C-C121-4F91-B62F-057356B0A048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B09CA-91E9-4D11-AA11-B84F40495E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFC55E4-D84D-4588-976D-1E2637B1BF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC1A189-D822-405B-A090-B1573FE12B14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C57E58-66E3-4FEC-A88F-B82C4B372B2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0BDFFB-638F-4FB7-A43A-812874D8774A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C468AE-3FA8-48B5-A05C-0690F1019190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C173CF7E-81DF-4AD5-AB17-A4C330B933D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638549EC-1BB1-4206-B8DC-C0101BBEF8A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F450DA-5FBA-47BB-9A7D-75873FB3E69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112701D9-7154-46E5-BF36-EE36A607C7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CB46AD-0395-4675-9714-CCB2A180EBA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B5258B-26E4-4853-9F27-4BB12886CC38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5854EF2F-7B58-49FA-B09A-2066799E2F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B1B04E8-A31F-4027-8E05-5461E7855F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E474DFB1-4173-40B8-B02D-42AFC5C86F9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD476-E402-408D-9BD6-886AB195704D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D566CFB-935B-40E4-9F4E-6216A42E7EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A97ED15-D0C6-4B64-BA08-EE50A6990272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D57834B-C031-4301-9839-7A32F13687EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE126ED-B743-4C6D-95FF-04F473A9A008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D901944-8E2B-41E5-BB82-CF1C97064711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13E353-0063-468B-96CD-97BF91C747C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913BBEFF-49E7-42AF-A850-B49E5A12AB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8580A81E-8BDE-4EB5-B830-6AA7550A25C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C1205B-6AC7-4DB5-B247-2108511D9957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA47107D-237A-4184-8BA2-601660F7FB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9862E49-124E-4B7D-941A-CFD2668B6481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43756EB8-9F85-4499-99F0-43E69CA3F470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6572E2-5B24-4E21-9F6F-3A7A17A9F098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C7AD56-CA31-4C08-A5C1-B50E767E1FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304CBDA-AF3E-4F32-BF45-FD2199D1E025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395788D-E23B-433A-B111-745C55018C68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05EA3461-021B-42CD-B4BD-4D2E8703DB93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6774C8-431B-42AC-8955-02B529222372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1ED81E-3D62-47FB-8FD4-B2732525C33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC82E058-25FE-4B6C-BA3C-AB043CFAB113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DD3CCB-91D5-48D6-80BC-CA643385BCE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41EB643A-7C3B-4017-A12C-FB48A4F6D9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04076FFA-D74F-4501-9921-D8EBDF97CD20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4440FC7-F90C-44E0-B7FB-C88BC95EAB77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8846D3C-39C6-48BE-9643-ACC479416257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07279DDB-B07D-4224-AA1C-24B4F3D63BB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DB5608-BEAB-4080-BD40-76C2FFB4DDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08718840-D468-4E86-8FFF-A2B1841E6BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B77426-B579-43C6-9340-F291138ECD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE776B91-9E25-48F5-A4F0-EB36B704AEBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D63DC7-0623-4777-86EC-06697FEBFD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7CD68D-6177-4F61-ABAF-C88453BD6C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C289687E-4D0F-4F32-92A8-137B5D6AA3C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC758216-672D-4F7B-8CF3-6433B06AA2FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419680D5-21E0-491C-98AA-9D079213A020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867027D4-9EB4-4BAB-BDCC-FD43A087442F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CD303F-AAE9-4635-987D-742031232BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57014B8E-5689-416B-9FE6-CE4A259E83C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3625E5-4583-4F38-B6E3-68FD20E54ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C365D42-1DEA-4FF2-86E4-1CC27E52E40E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F9F143-0AB4-4302-82B8-B4EA790EB08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE73B0A0-E275-449D-8ADD-86AE188DE82A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE06C64A-1610-4340-98CF-AC91258AB215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27F79F3-EA0A-429C-8DA9-BC276A94AFB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07609EB-E10B-4253-938E-81566036D81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC44D69-AAAB-4524-9D12-F1A606D57831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23D2887-1246-4EA4-B8B6-57BC7FB869E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEFC46D5-B23D-4513-9669-4DC53662F87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93E897C-5D7B-4532-99D9-53192A1F776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D0D618-D738-47F5-B7F7-C7F07972C893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A147E8-0778-49CE-92EF-ED1950138528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D264277-00CB-4FCC-ADAA-38536609D0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DFC6D19-9E02-4DE5-818F-931779A41F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC25725-73F6-4948-B17A-A05E8978EB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D9BFA32-89B3-4E26-B980-2694B5378D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FECF6BE-2CED-4510-91C5-195686C9C421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B903E2A0-EE73-4F13-AB26-8F5644462E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170B497C-05F2-46B5-92CD-ACF7C0BE1711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF53EA8-8EB4-455C-A986-405DBB122D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B97260E-1D7A-45B5-AD86-EBF8CA259FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58002875-D63D-4ABD-A8B7-DCAEB7E94AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC07903-D4B7-423F-9F79-7DF45E5350BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA65F0A9-8BBE-4674-86B8-894484DC6C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC48C-DCCB-442A-98D5-3165CCFAE7F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659206BB-510A-47F8-8B6E-FD030A6BE1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3257F5-CA55-4F35-9D09-5B85253DE786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5598510F-1057-4DB6-838C-8945FB6978DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2ADBEF-CF97-410A-816B-F9D1E3BAF205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655E770E-B9EE-4B08-B1EE-F393C7F68941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC47200-8F3F-4969-AABA-39F4B1E4E263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB17629-2454-478B-8E1A-AC2D2FC2233C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A2969-DC53-48E2-A5CA-4DF2B00D1960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2534F0E2-C427-4514-AE51-26EB0872B519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B485AC9-B986-4100-90CC-E4BC9B1AAFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76BE235-C991-43BB-B145-239D95084BC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6748F85C-A99A-4380-B01A-A51DBD43AED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421F0AF2-5F41-4F0C-A909-D76D72AB5FCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04332C1-9652-44ED-BD97-5A6AD0A4E6B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D376C32-99BE-4DF4-A63D-2156D10EEA73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0D6C21-7DCE-4F8C-9394-D0006695550D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6B51B5-96AA-44C8-9539-9D7F67143DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB78854-1E03-48F3-BC86-B0934641B47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D3350F-8083-4FD3-9432-36C10EE911EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB28789-A195-4EB8-AE96-6E1EFEE93E6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C96A17A-44EE-4FD0-9187-9BB9202AA9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6425C6-A338-42A0-B236-12B33147931D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3F6453-51EF-4509-94CB-24E8ECFBAC5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4861FF06-6720-4E5A-B599-F7F96D7D4FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF098E89-4979-45DB-AF4C-A5D0F5CE6F67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A263FA56-5F1F-4E91-A354-38648E130685\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102AFB09-B4EC-456C-899A-A9ABDA120D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24E8214-881A-4C15-A544-FB3FD5D14DCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02454A49-0345-4927-89DF-7A37C25E4E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1EDE72E-3734-4FB5-BC77-B7C3838D41F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E07450B-D81B-474D-9150-C9D8A62D44A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A892B60-7FD3-41A6-9997-586B76757416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4701D592-F06C-4713-9736-19DB130B5E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E6063A-23C9-4845-B575-5D330B6C68F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50C73A4-D52E-4560-B725-61F416E18505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25570E2C-BBE9-402F-9631-FA5014767CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59D57C2-CFB5-486E-A340-E63C7D7A8B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998DCE68-F426-47C5-80F7-BFE42FD69DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"917B3772-3856-4C63-9DC8-FE887A93CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE04ADB-3037-41E8-8DF4-8588FDFB759A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBF8567-4F5B-4142-9A3B-BD6AEE33595F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687CADE-6E49-4284-BD41-6CA2FDD846FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404409CA-326B-425D-A4E5-1A3C8CC45344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5E65D0-6DB9-41D2-9721-8F1232D8155F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46066C5B-DB48-4B83-9E5E-3809D3F7FED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D4F6F-5874-4F5D-91FD-E265DCE86667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DB082B-E169-4BE0-81DC-B2A7219C4DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA0A03C-21BB-4C5D-85B3-FF579F34E82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD387ADD-02CA-4154-BF86-0DBE664FE5F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F2A5C9-C593-4C42-A47E-F563C4696137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7576BD-43FE-44D2-A665-F78BDA4D964D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA12CAD-F622-4F14-8847-AFD8DC250B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA062554-DBBC-4215-9705-1ADA545B5887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCDD79D-80C4-4A52-94F6-F30237AE0C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6E2595-D9E7-46D6-99C8-336DEB1B4020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"829702E9-C0EB-4E4B-A979-41A2235B182B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A84814F-B070-45B0-ABC2-1BAAA212EFD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BD8917-5BEA-491C-B6E8-486FF957A876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897D23E-1BC1-4FBB-AD00-422413C1749C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C50FBC-6933-4E98-82B9-A70B1C836ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F8AD4D2-D48B-4F53-A0BA-A90E5A970832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971C6442-6546-440B-AD74-44A5BB527D11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4B6C48-261B-4B0E-BA2A-7E3060D01F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FC8B26-7611-45B6-A37D-DF7025E2E92D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543DB437-425F-4FF7-BDBD-FB5CC17E0056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E8DD28-EC33-489F-A71C-2AEACFB16FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B97F2B-A3D1-48A3-9FB7-755191FDD720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FD9FEF-2186-4416-93B7-B743657412A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38161238-5D40-485F-B0D2-D7621EC317D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B804174C-53DB-4641-BD26-3ECDD9FBD638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3930A6D-64DC-4953-AD7E-EED0C48B048E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B10FCF1-F496-4166-9162-41012C4D2B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAAD0F0-9182-46EF-8399-C04FB472BE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCADFB25-DCBB-4901-9E4D-132ED49C7F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0327393-DB2A-455B-8E20-3EDB3766CDA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E00698-8A08-433F-8852-8EDC422A53D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4925D0EA-D524-432F-8417-892BB8C3DDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3757F7B-4283-4ABF-974B-59E4E2358035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D86199-5CF3-4E7A-8295-50F958EA4B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"122BD094-E815-4081-B674-B71AC193BE0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8EA870-2228-4E81-A417-30E040A5C0E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D31B6-1E8D-4A44-9D7A-023051E7050A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49EEE5AA-3867-4137-B165-5004C34C77B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A38417-1DB2-4C85-80D9-D3968BF7A83B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74E9E4-F84C-4B7F-8A42-20EEC60986DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F99F83-A7E6-4AFD-BC42-7348EF6613AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A62A9F4-2B98-4F2D-9143-08D1689E38AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FD06CB-F456-44BD-900B-06131DC68B6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9044310E-4DF9-47BA-9D05-C1405DC8CDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA881CDA-1C16-43F1-A7D5-69502512A21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E629CF7-A706-4DD3-B3EB-A1F9711B0372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BCDBDF-A902-43A8-94A8-13541FB8CB32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC1EDA9-6CB8-4643-AC65-76B892319879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DB4F8D-E42C-4119-83BD-44D6AB9319B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E0227B-8F2B-48B3-97BC-73BA1BACEED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BD1F0B-7B75-4A5A-A708-BDE56D237354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE01A935-4048-4578-8FBA-1D12A95654D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D7D164-E631-4D49-B87A-0B7885148790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A10975-3375-4FB3-A008-56EB2ACD2737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A99895-6A48-4A44-B0F7-7BED55C677FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF4F98-0672-4101-9825-57B0F64EDBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2231374F-222A-4BA3-B14D-F69860668F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057E3667-7BA8-4142-8A1E-B957333D776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A77114-92C8-48C4-9D12-3ACC3030D5A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B5BF22-5E95-46A4-AF05-450CFD1312C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9490F926-AD57-40F3-A523-61D67486DCB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CC9B92-CF59-4121-9638-F4D4521952D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6592D-743B-4656-B1C0-247F36ABE5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC32129-C5DC-4D26-96D5-219F5291D6F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4426C-970C-49DB-950B-3F5ED17E682A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADED698-2702-479C-A24E-E9E6F35E9AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C0CFB-72A3-4446-9601-2C956C9A71F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE862F15-69CC-488E-ABE8-1E23A5A1089F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087D09E-ADCB-478A-87FD-B7113FD29EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B43E11E-5350-4DDB-A743-F84D4D2286D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D64D1ED-A386-4475-99AB-7727DE67E1A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFB4646-A5BA-4662-A47F-62407AFEDFF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A923F6-E352-4752-B7D3-007FE1CAFE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070C20AB-66F2-4EE2-8134-5E40DBB9B9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA49CF7-C6BE-4337-A0A8-A603D8955EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F7F6B-847A-479D-B6B1-BBA331D06DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C375A9D-C7CE-49A6-B08D-9CAB22E16D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06531E6-126A-4FBB-BEBB-F9023C4738F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B8CDF0-1489-4E4C-B004-A22E06FC10D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6ACF161-472E-4088-85C2-5940C9C88D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0B94F6-EC15-4C12-8BA5-CC6602A7A725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067C65E5-5392-4DAF-A6BD-640D78C19CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1647DAC-CED6-4DAF-8F82-A42D6D691DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC498-F558-4C2F-9E14-7897060CA9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6839AE9B-9A8A-4312-80FC-0549C675A815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E0E7358-1EC1-43DA-99B3-A2D6D57E0121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43808CCF-1EF0-41CE-983D-DD6BB775895E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5D3DE-5506-4F16-B7F9-5032A1277D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED598260-2A9B-46F7-AA85-0DA97DA0D42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06F1CFD2-8F32-4CE8-9D9B-C65B332775B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF1F73B-4736-40BC-9053-951B5BF1059E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA47606-176C-4F6B-A316-4C536B63FA4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D609DB7E-AE80-48E0-B7B6-E622B6208ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09C3656-AE49-4F26-BD28-B725E8C40304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90F0D1EF-2FE1-498A-AE38-BF755A680E88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22243DEF-F01B-4774-AEC1-40D776E1167E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25934425-944F-4B9A-8A16-F1DCBF3D5032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A5BC76B-A4FC-4702-A544-889E62F8509E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4E44C3-D29F-4057-AE12-BA19FFFF69E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"383DCE68-3882-4274-AA4A-5E030530E4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04EC7421-963C-43F7-9450-2E204BAFF1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3AF74E-C719-4E55-959D-681174FFFB90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E290F38C-7A86-469D-9E6A-F0EC69DBE23A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EF77397-85D0-4EC2-9887-2D0D9D253450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E9761E8-7978-4141-94B5-EEFE7C00BC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E921DEBA-3063-4639-9823-2FDDD8DEA793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF44A7C9-834B-49DF-B1B6-B1575473179B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5983B72F-9194-47CB-B444-2ECC6360B686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0E40BC-5745-4AB0-B991-61A0C63DB284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E207648-E57F-4C43-8FDD-049BF9214664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EB131A-87DE-45FB-9025-B02EC28C4304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF30717-CBEF-42F9-AE0D-4F6A1877EA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D0351-303B-4ABF-A7FD-734176095307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B080431-626C-4A7B-AB37-47EE6811A5A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D48CFC-1322-4C53-8B53-88E7ACC724BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6456D0-32AE-44A9-9F63-AD64B5E49182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EA99F9-22C2-47ED-9DDD-928E19C4C51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8867B2-F297-4D30-AD43-77B0F67FAE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178345A5-9A38-4C8F-B3BB-430276FA4998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A7D63-4638-480C-94CB-ED06613BA75C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178D9E36-79EC-4672-8E46-0FD6597CA1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED0D492-ADAB-41ED-A283-024D3CED441F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBB5A97-EA4F-454C-819C-DE1CE7018E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9733E69-E7CF-444C-B72C-AC8E5DEF2449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD24563-9157-4DE1-95ED-D4E3E879219E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83F8602-6679-4B3C-BBDD-3BDB2B317F70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3E45C-1943-42BA-9F6D-EA64D67BF954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B4C84-1258-4F2F-B8A3-55353B3D13BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B27F755-4C38-4469-8A9D-C9266BDA53ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E21977E-7085-46C5-8E89-F952C2EBCE04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB72D13B-5880-4CB2-8E80-CB6A39B5A302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BCB7D2-4B68-4FF8-BFC9-06C39A708C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8292CC-DACB-489A-BCB2-73DC2C6F944C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D83AEDF-2671-4278-8088-BA517192AB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF72F37A-2F28-40E6-A84B-0E1DF63B1812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EAE9CE6-DA95-40B0-AE65-656FA4603D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5241B3E0-F968-4B16-8BF8-191C6F7B224A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82FC910-F3AB-42BF-9740-EC09F0AC179D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAE2B11-B0F5-415F-BD6B-E285EF9C9095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA58EFB-7672-4902-ABC1-65217AA617AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E2764D-7D6A-4CE0-A628-FFE966A6462F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D66D18C-17F2-4259-B1D8-7C63797A024C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C8DFB5-9D8B-4370-849A-DC061910E54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B704835-1250-44E1-923C-5DE2F4DD25D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3CA224-B5DE-4451-9CF9-929ABEA242EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3D8E340-AE91-4F29-9F22-E0CE6718FC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710DBCD5-788D-4140-AC16-EC6E126CFA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A767EC83-AAED-4FEA-A35E-A503369FE4FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20821868-F7D2-4132-8D63-98E1089DB46C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB9295A-8832-4670-B268-FBD0BC086447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489BD4AC-50C6-422B-A2B2-00A70E611114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5694238-F4E5-4689-ADD2-67C25762ED92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57D44C0-AA8D-46B0-8923-ADB312E3937F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A551BBB-76CD-4C26-913F-B02C66E5D846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4A44F2-68BF-4709-946B-C976DA3A9C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"038AC553-5523-4687-843D-6FEA7264EDEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE5D09C-3272-4810-9F41-97BDBBFE4160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C5122F-D822-4E71-A417-88EB51F1786B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14C3438-B876-45B9-85F5-61354207AF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9236F094-B913-43F2-B703-CE33B9CEBA0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345FF353-FE25-41F4-97EC-FF32BE2796EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A9AD79-9B4B-4EE8-810B-359901C3540C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BF77DA-E159-4336-A552-B22BE437670D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86CCC45-270E-4760-A7E9-D39C74C00FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C105930C-D2BB-4FA1-B5D1-882D90D867C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45227E88-ACFF-43A5-AF45-C6542A6EF681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA2030D-CEAF-46BF-9669-19EAD541BDB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1612AE8A-3165-47A3-AEA8-65F4156C48BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5168E40-DF2F-4E39-8B5E-9659EBBB99A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6DA7A-7C97-40E1-B31A-B92BB658C429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF128B-9984-4C91-B7F6-968DE376C3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B167F1-63FA-4C86-84AB-836ABF84E6E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955420F9-3A3F-40E0-9940-DD43C5C78D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4A437C-6C00-4729-91CC-D27EB3542633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74ED727D-B1A9-4F4B-92C7-3F00F3A80013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C24951-B3FA-48E6-AFAC-6CA0D2348230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185E8FBC-9EE9-472E-867B-0B0DEEECA13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3C00A0-C28A-46EB-853D-DAE3819399D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CAB607-87B2-49F4-9FAB-662D5EA3D11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C504C3-7EEE-4A0F-8589-19C1E806E690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5230F6AF-88CB-4EE2-B292-8B9A7217D10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B45C39D-03E8-46C1-88DD-94E382F4A961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2DC691-025A-441E-AAC2-C8583F54733D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE07EA7-4CDF-4038-A948-6AC126C7F6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A2241C-37AE-41AE-A8D1-D9AB18CCE16D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6DEAA1-3209-4B49-B931-43E8C1C5BE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE086F8-5C8B-4F0C-B53A-76BD4E67B678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB15368B-21A1-429E-8B9C-A095C4E8BA67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA925F96-6DDD-4F71-BF13-710C8A89D860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E41414A-6B0B-4511-A9A1-7FF99DD25DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EB66B4-8F1B-4F35-9371-17FB761997CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDFD1AF-2716-4C95-ADFF-79EFA915C286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5390A12B-80BD-4889-BF0F-95E65D10D037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05637A96-AF09-4FF5-A918-AB369AA2D1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FA0279-D587-471E-8EC0-211F78DA4DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1CC27DB-11D4-412A-BC69-CF32A0CABCF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FE9694-F0E7-4B45-82A1-065DA96B9794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC93757-5FD7-403D-B5ED-CC8793002352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8D8C4-29EA-4D09-87AB-A570403BA0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89421EC5-52E5-441F-AD3B-5C5E964F836D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2117880B-FDD4-4A90-B29B-6D840D26645D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8EED1D9-75CC-41E9-9C0C-C648E0717024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB43A67-9DD7-49E6-BA77-220120C90700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3413CB-86D3-4684-B651-DBACC0660E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB677676-E793-4158-BF53-3F5ECCECE203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32E6092-1AF6-499F-B176-F575E766E8F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E524AFD4-2D9F-4A4B-82F4-13BCDE99041E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F309BC-6F31-490C-982B-14F9319276F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA909754-B60A-4B30-AF42-4C8734E155AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEFB056-0872-434B-9630-28A1AAEAD470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A62CB9-FB01-45CB-9E10-E72D87C0E1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD8EBFCC-AD76-4285-93BD-D14219C6EA5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF7E334-6DC7-44B5-A102-649A68300C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B4F7FE-61A3-417A-BAA9-E686A76F3A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7305838B-84CA-4BB8-A350-B2D2844F1041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D356D196-8AB0-4387-A644-C5E68174A60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89587A92-6234-40C3-83DB-F72319FFBC79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D557D68C-8279-4BFD-9EA6-17A83754B8FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ECA0BC9-1CA4-4B95-B98F-9098B2550309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1298CF87-124D-450B-928D-F39CCA2BAF42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF12820F-A2BE-44BF-A85D-7F4623898DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853DE44A-84C9-4959-865F-D538DF895647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13326C69-C160-482F-BF28-5425B57BE738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F15EF0E-37CF-4944-8B6B-A82B4348CDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92D12220-840B-4397-889C-9649F34B7E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB926B2-077B-4752-80EC-D39446115FCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C1D750-1FE9-40F8-BCB9-77D13C13906C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07040D2-2ADC-4CC4-860F-74A7C64FD6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BF12F06-D672-40BF-B7A6-1DA3711136F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59D80E8-5A2C-402F-8AE3-766ECEDA14F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F66D2E5-BD5B-406D-82A0-4E1E32EDC337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557E240A-6760-434E-9C3A-1E5E9129912D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D196C46-0F17-4C42-A232-B12CE85D9641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3B40170-C992-4386-8429-52A216F64384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71A52C1-1FBF-4730-8234-700F87D5E74D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9219B34E-F94C-4ECA-85E5-850EBD0F41A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B930DF9-C425-41AF-9736-0BD611C79CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD02FD9-8E63-4B79-8878-07C4316981C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B84F7DC-EE67-4748-8AE2-7070A6F79BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78A1CFF-F05E-429C-A9AA-935078574A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE28AD41-2287-4F2B-924C-30B66A320443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E31FFECA-F663-4B59-9800-1C6A8BD84626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F194D4-9425-470E-B812-CD92B5C5A68A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E426811-F97D-42CE-B06D-41CDA84E1B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F5F5950-C21F-4142-BA1E-E074FAF249F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30EE6B10-84FC-4D9D-8F39-4B7000CC85AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFDA5D5-F00F-40CC-B492-C433200A491C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7061E-E26C-4905-AB41-18267DD32821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFC055D-B249-4EB4-8A9F-BE4391A27505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F91FC3-CF90-450D-9E71-4A301A997921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"739731E7-F1BF-4D12-B103-E7F85B35307E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1C36BE-D4DC-4965-8106-EDA77BDB64DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B85362-44E5-4107-AC8A-29DEE2A7EEDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63293B85-A014-4F23-97EE-6CE3467FCB06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"708D6E00-A2E5-4B08-88E7-C872ACFC341D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD8EE0E-2BA3-49DD-91D1-81AB67F16475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC75E5CF-4241-45A8-AD45-1F7F077CEEA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D132291B-AADD-49E3-ADD6-333E1F1D8DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADF328B-D286-4C36-9F21-11A58D55D03A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D23470-A702-426D-A63C-4F7BAC158762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"750A77C5-1367-4E04-9ABF-1AB2D46C29C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1340A29-3428-4FAD-AA07-7F625915E34D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50CC669-9555-45E9-A43B-05A21FB040E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA1FA19-A836-4D6A-8C2D-718ECE6866D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECEBDB0-2E0A-416B-9737-82C1FC65A06C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C39B6A99-7060-4011-8FA3-E5ABE5C02813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF9E723E-1095-424E-A90D-380CA0D2795E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35380FB9-90FF-405F-8E2E-01C1DD209540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2215D655-0EA9-4530-AB68-7B1C7360D692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"020B6FED-EAE2-478C-8FF4-CB75F24E9A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE519C62-F5BB-461C-91EF-2979CD506C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F693457C-3529-4E62-A672-1B862F235D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725E953B-CD85-4451-8D18-40E8D80479AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196C11A9-1A63-49A0-918F-4A3F9293FAF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5A42E1-5CC9-4165-8809-69FB6DF12AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C753C7B-BB62-41C9-BF21-8C653B433FAE\"}]}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20220210-0008/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220210-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220210-0008/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:32:09.556Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-0127\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:21:55.611621Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"NVD-CWE-Other\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:15:12.444Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) Processors\", \"versions\": [{\"status\": \"affected\", \"version\": \"See references\"}]}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220210-0008/\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"denial of service\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2022-02-10T09:06:28.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"See references\"}]}, \"product_name\": \"Intel(R) Processors\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220210-0008/\", \"name\": \"https://security.netapp.com/advisory/ntap-20220210-0008/\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"denial of service\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-0127\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secure@intel.com\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-0127\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-05T17:00:19.518Z\", \"dateReserved\": \"2020-10-22T00:00:00.000Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2022-02-09T22:04:16.000Z\", \"assignerShortName\": \"intel\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  fkie_cve-2021-0127
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://security.netapp.com/advisory/ntap-20220210-0008/ | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220210-0008/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html | Vendor Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| netapp | clustered_data_ontap | - | |
| intel | celeron_g1610 | - | |
| intel | celeron_g1610t | - | |
| intel | celeron_g1620 | - | |
| intel | celeron_g1620t | - | |
| intel | celeron_g1630 | - | |
| intel | celeron_g1820 | - | |
| intel | celeron_g1820t | - | |
| intel | celeron_g1820te | - | |
| intel | celeron_g1830 | - | |
| intel | celeron_g3930e | - | |
| intel | celeron_g3930te | - | |
| intel | core_i3-1000g1 | - | |
| intel | core_i3-1000g4 | - | |
| intel | core_i3-1005g1 | - | |
| intel | core_i3-10100 | - | |
| intel | core_i3-10100e | - | |
| intel | core_i3-10100f | - | |
| intel | core_i3-10100t | - | |
| intel | core_i3-10100te | - | |
| intel | core_i3-10100y | - | |
| intel | core_i3-10105 | - | |
| intel | core_i3-10105f | - | |
| intel | core_i3-10105t | - | |
| intel | core_i3-10110u | - | |
| intel | core_i3-10110y | - | |
| intel | core_i3-10300 | - | |
| intel | core_i3-10300t | - | |
| intel | core_i3-10305 | - | |
| intel | core_i3-10305t | - | |
| intel | core_i3-10320 | - | |
| intel | core_i3-10325 | - | |
| intel | core_i3-11100he | - | |
| intel | core_i3-1110g4 | - | |
| intel | core_i3-1115g4 | - | |
| intel | core_i3-1115g4e | - | |
| intel | core_i3-1115gre | - | |
| intel | core_i3-1120g4 | - | |
| intel | core_i3-1125g4 | - | |
| intel | core_i3-6006u | - | |
| intel | core_i3-6098p | - | |
| intel | core_i3-6100 | - | |
| intel | core_i3-6100e | - | |
| intel | core_i3-6100h | - | |
| intel | core_i3-6100t | - | |
| intel | core_i3-6100te | - | |
| intel | core_i3-6100u | - | |
| intel | core_i3-6102e | - | |
| intel | core_i3-6157u | - | |
| intel | core_i3-6167u | - | |
| intel | core_i3-6300 | - | |
| intel | core_i3-6300t | - | |
| intel | core_i3-6320 | - | |
| intel | core_i3-7020u | - | |
| intel | core_i3-7100 | - | |
| intel | core_i3-7100e | - | |
| intel | core_i3-7100h | - | |
| intel | core_i3-7100t | - | |
| intel | core_i3-7100u | - | |
| intel | core_i3-7101e | - | |
| intel | core_i3-7101te | - | |
| intel | core_i3-7102e | - | |
| intel | core_i3-7130u | - | |
| intel | core_i3-7167u | - | |
| intel | core_i3-7300 | - | |
| intel | core_i3-7300t | - | |
| intel | core_i3-7320 | - | |
| intel | core_i3-7350k | - | |
| intel | core_i3-8100 | - | |
| intel | core_i3-8100b | - | |
| intel | core_i3-8100h | - | |
| intel | core_i3-8100t | - | |
| intel | core_i3-8109u | - | |
| intel | core_i3-8130u | - | |
| intel | core_i3-8140u | - | |
| intel | core_i3-8145u | - | |
| intel | core_i3-8145ue | - | |
| intel | core_i3-8300 | - | |
| intel | core_i3-8300t | - | |
| intel | core_i3-8350k | - | |
| intel | core_i3-9100 | - | |
| intel | core_i3-9100e | - | |
| intel | core_i3-9100f | - | |
| intel | core_i3-9100hl | - | |
| intel | core_i3-9100t | - | |
| intel | core_i3-9100te | - | |
| intel | core_i3-9300 | - | |
| intel | core_i3-9300t | - | |
| intel | core_i3-9320 | - | |
| intel | core_i3-9350k | - | |
| intel | core_i3-9350kf | - | |
| intel | core_i5-10200h | - | |
| intel | core_i5-10210u | - | |
| intel | core_i5-10210y | - | |
| intel | core_i5-10300h | - | |
| intel | core_i5-1030g4 | - | |
| intel | core_i5-1030g7 | - | |
| intel | core_i5-10310u | - | |
| intel | core_i5-10310y | - | |
| intel | core_i5-1035g1 | - | |
| intel | core_i5-1035g4 | - | |
| intel | core_i5-1035g7 | - | |
| intel | core_i5-1038ng7 | - | |
| intel | core_i5-10400 | - | |
| intel | core_i5-10400f | - | |
| intel | core_i5-10400h | - | |
| intel | core_i5-10400t | - | |
| intel | core_i5-10500 | - | |
| intel | core_i5-10500e | - | |
| intel | core_i5-10500h | - | |
| intel | core_i5-10500t | - | |
| intel | core_i5-10500te | - | |
| intel | core_i5-10505 | - | |
| intel | core_i5-10600 | - | |
| intel | core_i5-10600k | - | |
| intel | core_i5-10600kf | - | |
| intel | core_i5-10600t | - | |
| intel | core_i5-11260h | - | |
| intel | core_i5-11300h | - | |
| intel | core_i5-1130g7 | - | |
| intel | core_i5-11320h | - | |
| intel | core_i5-1135g7 | - | |
| intel | core_i5-11400 | - | |
| intel | core_i5-11400f | - | |
| intel | core_i5-11400h | - | |
| intel | core_i5-11400t | - | |
| intel | core_i5-1140g7 | - | |
| intel | core_i5-1145g7 | - | |
| intel | core_i5-1145g7e | - | |
| intel | core_i5-1145gre | - | |
| intel | core_i5-11500 | - | |
| intel | core_i5-11500h | - | |
| intel | core_i5-11500he | - | |
| intel | core_i5-11500t | - | |
| intel | core_i5-1155g7 | - | |
| intel | core_i5-11600 | - | |
| intel | core_i5-11600k | - | |
| intel | core_i5-11600kf | - | |
| intel | core_i5-11600t | - | |
| intel | core_i5-6200u | - | |
| intel | core_i5-6260u | - | |
| intel | core_i5-6267u | - | |
| intel | core_i5-6287u | - | |
| intel | core_i5-6300hq | - | |
| intel | core_i5-6300u | - | |
| intel | core_i5-6350hq | - | |
| intel | core_i5-6360u | - | |
| intel | core_i5-6400 | - | |
| intel | core_i5-6400t | - | |
| intel | core_i5-6402p | - | |
| intel | core_i5-6440eq | - | |
| intel | core_i5-6440hq | - | |
| intel | core_i5-6442eq | - | |
| intel | core_i5-6500 | - | |
| intel | core_i5-6500t | - | |
| intel | core_i5-6500te | - | |
| intel | core_i5-6585r | - | |
| intel | core_i5-6600 | - | |
| intel | core_i5-6600k | - | |
| intel | core_i5-6600t | - | |
| intel | core_i5-6685r | - | |
| intel | core_i5-7200u | - | |
| intel | core_i5-7260u | - | |
| intel | core_i5-7267u | - | |
| intel | core_i5-7287u | - | |
| intel | core_i5-7300hq | - | |
| intel | core_i5-7300u | - | |
| intel | core_i5-7360u | - | |
| intel | core_i5-7400 | - | |
| intel | core_i5-7400t | - | |
| intel | core_i5-7440eq | - | |
| intel | core_i5-7440hq | - | |
| intel | core_i5-7442eq | - | |
| intel | core_i5-7500 | - | |
| intel | core_i5-7500t | - | |
| intel | core_i5-7600 | - | |
| intel | core_i5-7600k | - | |
| intel | core_i5-7600t | - | |
| intel | core_i5-7640x | - | |
| intel | core_i5-7y54 | - | |
| intel | core_i5-7y57 | - | |
| intel | core_i5-8250u | - | |
| intel | core_i5-8305g | - | |
| intel | core_i5-8350u | - | |
| intel | core_i5-8400 | - | |
| intel | core_i5-8600k | - | |
| intel | core_i5-9300h | - | |
| intel | core_i5-9300hf | - | |
| intel | core_i5-9400 | - | |
| intel | core_i5-9400f | - | |
| intel | core_i5-9400h | - | |
| intel | core_i5-9400t | - | |
| intel | core_i5-9500 | - | |
| intel | core_i5-9500e | - | |
| intel | core_i5-9500f | - | |
| intel | core_i5-9500t | - | |
| intel | core_i5-9500te | - | |
| intel | core_i5-9600 | - | |
| intel | core_i5-9600k | - | |
| intel | core_i5-9600kf | - | |
| intel | core_i5-9600t | - | |
| intel | core_i7-10510u | - | |
| intel | core_i7-10510y | - | |
| intel | core_i7-1060g7 | - | |
| intel | core_i7-10610u | - | |
| intel | core_i7-1065g7 | - | |
| intel | core_i7-1068ng7 | - | |
| intel | core_i7-10700 | - | |
| intel | core_i7-10700e | - | |
| intel | core_i7-10700f | - | |
| intel | core_i7-10700k | - | |
| intel | core_i7-10700kf | - | |
| intel | core_i7-10700t | - | |
| intel | core_i7-10700te | - | |
| intel | core_i7-10710u | - | |
| intel | core_i7-10750h | - | |
| intel | core_i7-10810u | - | |
| intel | core_i7-10850h | - | |
| intel | core_i7-10870h | - | |
| intel | core_i7-10875h | - | |
| intel | core_i7-11370h | - | |
| intel | core_i7-11375h | - | |
| intel | core_i7-11390h | - | |
| intel | core_i7-11600h | - | |
| intel | core_i7-1160g7 | - | |
| intel | core_i7-1165g7 | - | |
| intel | core_i7-11700 | - | |
| intel | core_i7-11700f | - | |
| intel | core_i7-11700k | - | |
| intel | core_i7-11700kf | - | |
| intel | core_i7-11700t | - | |
| intel | core_i7-11800h | - | |
| intel | core_i7-1180g7 | - | |
| intel | core_i7-11850h | - | |
| intel | core_i7-11850he | - | |
| intel | core_i7-1185g7 | - | |
| intel | core_i7-1185g7e | - | |
| intel | core_i7-1185gre | - | |
| intel | core_i7-1195g7 | - | |
| intel | core_i7-3820 | - | |
| intel | core_i7-3920xm | - | |
| intel | core_i7-3930k | - | |
| intel | core_i7-3940xm | - | |
| intel | core_i7-3960x | - | |
| intel | core_i7-3970x | - | |
| intel | core_i7-4820k | - | |
| intel | core_i7-4930k | - | |
| intel | core_i7-4930mx | - | |
| intel | core_i7-4940mx | - | |
| intel | core_i7-4960x | - | |
| intel | core_i7-5820k | - | |
| intel | core_i7-5930k | - | |
| intel | core_i7-5960x | - | |
| intel | core_i7-6500u | - | |
| intel | core_i7-6560u | - | |
| intel | core_i7-6567u | - | |
| intel | core_i7-6600u | - | |
| intel | core_i7-6650u | - | |
| intel | core_i7-6660u | - | |
| intel | core_i7-6700 | - | |
| intel | core_i7-6700hq | - | |
| intel | core_i7-6700k | - | |
| intel | core_i7-6700t | - | |
| intel | core_i7-6700te | - | |
| intel | core_i7-6770hq | - | |
| intel | core_i7-6785r | - | |
| intel | core_i7-6800k | - | |
| intel | core_i7-6820eq | - | |
| intel | core_i7-6820hk | - | |
| intel | core_i7-6820hq | - | |
| intel | core_i7-6822eq | - | |
| intel | core_i7-6850k | - | |
| intel | core_i7-6870hq | - | |
| intel | core_i7-6900k | - | |
| intel | core_i7-6920hq | - | |
| intel | core_i7-6950x | - | |
| intel | core_i7-6970hq | - | |
| intel | core_i7-7500u | - | |
| intel | core_i7-7560u | - | |
| intel | core_i7-7567u | - | |
| intel | core_i7-7600u | - | |
| intel | core_i7-7660u | - | |
| intel | core_i7-7700 | - | |
| intel | core_i7-7700hq | - | |
| intel | core_i7-7700k | - | |
| intel | core_i7-7700t | - | |
| intel | core_i7-7740x | - | |
| intel | core_i7-7800x | - | |
| intel | core_i7-7820eq | - | |
| intel | core_i7-7820hk | - | |
| intel | core_i7-7820hq | - | |
| intel | core_i7-7820x | - | |
| intel | core_i7-7920hq | - | |
| intel | core_i7-7y75 | - | |
| intel | core_i7-8086k | - | |
| intel | core_i7-8500y | - | |
| intel | core_i7-8550u | - | |
| intel | core_i7-8557u | - | |
| intel | core_i7-8559u | - | |
| intel | core_i7-8565u | - | |
| intel | core_i7-8569u | - | |
| intel | core_i7-8650u | - | |
| intel | core_i7-8665u | - | |
| intel | core_i7-8665ue | - | |
| intel | core_i7-8700 | - | |
| intel | core_i7-8700b | - | |
| intel | core_i7-8700k | - | |
| intel | core_i7-8700t | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8706g_ | - | |
| intel | core_i7-8709g | - | |
| intel | core_i7-8750h | - | |
| intel | core_i7-8809g | - | |
| intel | core_i7-8850h | - | |
| intel | core_i7-9700 | - | |
| intel | core_i7-9700e | - | |
| intel | core_i7-9700f | - | |
| intel | core_i7-9700k | - | |
| intel | core_i7-9700kf | - | |
| intel | core_i7-9700t | - | |
| intel | core_i7-9700te | - | |
| intel | core_i7-9750h | - | |
| intel | core_i7-9750hf | - | |
| intel | core_i7-9800x | - | |
| intel | core_i7-9850h | - | |
| intel | core_i7-9850he | - | |
| intel | core_i7-9850hl | - | |
| intel | core_i9-10850k | - | |
| intel | core_i9-10885h | - | |
| intel | core_i9-10900 | - | |
| intel | core_i9-10900e | - | |
| intel | core_i9-10900f | - | |
| intel | core_i9-10900k | - | |
| intel | core_i9-10900kf | - | |
| intel | core_i9-10900t | - | |
| intel | core_i9-10900te | - | |
| intel | core_i9-10900x | - | |
| intel | core_i9-10920x | - | |
| intel | core_i9-10940x | - | |
| intel | core_i9-10980hk | - | |
| intel | core_i9-10980xe | - | |
| intel | core_i9-11900 | - | |
| intel | core_i9-11900f | - | |
| intel | core_i9-11900h | - | |
| intel | core_i9-11900k | - | |
| intel | core_i9-11900kf | - | |
| intel | core_i9-11900t | - | |
| intel | core_i9-11950h | - | |
| intel | core_i9-11980hk | - | |
| intel | core_i9-7900x | - | |
| intel | core_i9-7920x | - | |
| intel | core_i9-7940x | - | |
| intel | core_i9-7960x | - | |
| intel | core_i9-7980xe | - | |
| intel | core_i9-9820x | - | |
| intel | core_i9-9880h | - | |
| intel | core_i9-9900 | - | |
| intel | core_i9-9900k | - | |
| intel | core_i9-9900kf | - | |
| intel | core_i9-9900ks | - | |
| intel | core_i9-9900t | - | |
| intel | core_i9-9900x | - | |
| intel | core_i9-9920x | - | |
| intel | core_i9-9940x | - | |
| intel | core_i9-9960x | - | |
| intel | core_i9-9980hk | - | |
| intel | core_i9-9980xe | - | |
| intel | pentium_gold_4410y | - | |
| intel | pentium_gold_4415u | - | |
| intel | pentium_gold_4415y | - | |
| intel | pentium_gold_4417u | - | |
| intel | pentium_gold_4425y | - | |
| intel | pentium_gold_5405u | - | |
| intel | pentium_gold_6405u | - | |
| intel | pentium_gold_6500y | - | |
| intel | pentium_gold_7505 | - | |
| intel | pentium_gold_g5400 | - | |
| intel | pentium_gold_g5400t | - | |
| intel | pentium_gold_g5420 | - | |
| intel | pentium_gold_g5420t | - | |
| intel | pentium_gold_g5500 | - | |
| intel | pentium_gold_g5500t | - | |
| intel | pentium_gold_g5600 | - | |
| intel | pentium_gold_g5600t | - | |
| intel | pentium_gold_g5620 | - | |
| intel | pentium_gold_g6400 | - | |
| intel | pentium_gold_g6400e | - | |
| intel | pentium_gold_g6400t | - | |
| intel | pentium_gold_g6400te | - | |
| intel | pentium_gold_g6405 | - | |
| intel | pentium_gold_g6405t | - | |
| intel | pentium_gold_g6500 | - | |
| intel | pentium_gold_g6500t | - | |
| intel | pentium_gold_g6505 | - | |
| intel | pentium_gold_g6505t | - | |
| intel | pentium_gold_g6600 | - | |
| intel | pentium_gold_g6605 | - | |
| intel | pentium_gold_g7400 | - | |
| intel | pentium_gold_g7400e | - | |
| intel | pentium_gold_g7400t | - | |
| intel | pentium_gold_g7400te | - | |
| intel | xeon_bronze_3104 | - | |
| intel | xeon_bronze_3106 | - | |
| intel | xeon_bronze_3204 | - | |
| intel | xeon_bronze_3206r | - | |
| intel | xeon_d-1513n | - | |
| intel | xeon_d-1518 | - | |
| intel | xeon_d-1520 | - | |
| intel | xeon_d-1521 | - | |
| intel | xeon_d-1523n | - | |
| intel | xeon_d-1527 | - | |
| intel | xeon_d-1528 | - | |
| intel | xeon_d-1529 | - | |
| intel | xeon_d-1531 | - | |
| intel | xeon_d-1533n | - | |
| intel | xeon_d-1537 | - | |
| intel | xeon_d-1539 | - | |
| intel | xeon_d-1540 | - | |
| intel | xeon_d-1541 | - | |
| intel | xeon_d-1543n | - | |
| intel | xeon_d-1548 | - | |
| intel | xeon_d-1553n | - | |
| intel | xeon_d-1557 | - | |
| intel | xeon_d-1559 | - | |
| intel | xeon_d-1567 | - | |
| intel | xeon_d-1571 | - | |
| intel | xeon_d-1577 | - | |
| intel | xeon_d-1602 | - | |
| intel | xeon_d-1622 | - | |
| intel | xeon_d-1623n | - | |
| intel | xeon_d-1627 | - | |
| intel | xeon_d-1633n | - | |
| intel | xeon_d-1637 | - | |
| intel | xeon_d-1649n | - | |
| intel | xeon_d-1653n | - | |
| intel | xeon_d-2123it | - | |
| intel | xeon_d-2141i | - | |
| intel | xeon_d-2142it | - | |
| intel | xeon_d-2143it | - | |
| intel | xeon_d-2145nt | - | |
| intel | xeon_d-2146nt | - | |
| intel | xeon_d-2161i | - | |
| intel | xeon_d-2163it | - | |
| intel | xeon_d-2166nt | - | |
| intel | xeon_d-2173it | - | |
| intel | xeon_d-2177nt | - | |
| intel | xeon_d-2183it | - | |
| intel | xeon_d-2187nt | - | |
| intel | xeon_e-2124 | - | |
| intel | xeon_e-2124g | - | |
| intel | xeon_e-2126g | - | |
| intel | xeon_e-2134 | - | |
| intel | xeon_e-2136 | - | |
| intel | xeon_e-2144g | - | |
| intel | xeon_e-2146g | - | |
| intel | xeon_e-2174g | - | |
| intel | xeon_e-2176g | - | |
| intel | xeon_e-2176m | - | |
| intel | xeon_e-2186g | - | |
| intel | xeon_e-2186m | - | |
| intel | xeon_e-2224 | - | |
| intel | xeon_e-2224g | - | |
| intel | xeon_e-2226g | - | |
| intel | xeon_e-2226ge | - | |
| intel | xeon_e-2234 | - | |
| intel | xeon_e-2236 | - | |
| intel | xeon_e-2244g | - | |
| intel | xeon_e-2246g | - | |
| intel | xeon_e-2254me | - | |
| intel | xeon_e-2254ml | - | |
| intel | xeon_e-2274g | - | |
| intel | xeon_e-2276g | - | |
| intel | xeon_e-2276m | - | |
| intel | xeon_e-2276me | - | |
| intel | xeon_e-2276ml | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2278ge | - | |
| intel | xeon_e-2278gel | - | |
| intel | xeon_e-2286g | - | |
| intel | xeon_e-2286m | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2314 | - | |
| intel | xeon_e-2324g | - | |
| intel | xeon_e-2334 | - | |
| intel | xeon_e-2336 | - | |
| intel | xeon_e-2356g | - | |
| intel | xeon_e-2374g | - | |
| intel | xeon_e-2378 | - | |
| intel | xeon_e-2378g | - | |
| intel | xeon_e-2386g | - | |
| intel | xeon_e-2388g | - | |
| intel | xeon_e3-1220_v5 | - | |
| intel | xeon_e3-1225_v5 | - | |
| intel | xeon_e3-1230_v5 | - | |
| intel | xeon_e3-1235l_v5 | - | |
| intel | xeon_e3-1240_v5 | - | |
| intel | xeon_e3-1240l_v5 | - | |
| intel | xeon_e3-1245_v5 | - | |
| intel | xeon_e3-1260l_v5 | - | |
| intel | xeon_e3-1268l_v5 | - | |
| intel | xeon_e3-1270_v5 | - | |
| intel | xeon_e3-1275_v5 | - | |
| intel | xeon_e3-1280_v5 | - | |
| intel | xeon_e3-1501l_v6 | - | |
| intel | xeon_e3-1501m_v6 | - | |
| intel | xeon_e3-1505l_v5 | - | |
| intel | xeon_e3-1505m_v5 | - | |
| intel | xeon_e3-1515m_v5 | - | |
| intel | xeon_e3-1535m_v5 | - | |
| intel | xeon_e3-1545m_v5 | - | |
| intel | xeon_e3-1558l_v5 | - | |
| intel | xeon_e3-1565l_v5 | - | |
| intel | xeon_e3-1575m_v5 | - | |
| intel | xeon_e3-1578l_v5 | - | |
| intel | xeon_e3-1585_v5 | - | |
| intel | xeon_e3-1585l_v5 | - | |
| intel | xeon_gold_5115 | - | |
| intel | xeon_gold_5118 | - | |
| intel | xeon_gold_5119t | - | |
| intel | xeon_gold_5120 | - | |
| intel | xeon_gold_5120t | - | |
| intel | xeon_gold_5122 | - | |
| intel | xeon_gold_5215 | - | |
| intel | xeon_gold_5215l | - | |
| intel | xeon_gold_5217 | - | |
| intel | xeon_gold_5218 | - | |
| intel | xeon_gold_5218b | - | |
| intel | xeon_gold_5218n | - | |
| intel | xeon_gold_5218r | - | |
| intel | xeon_gold_5218t | - | |
| intel | xeon_gold_5220 | - | |
| intel | xeon_gold_5220r | - | |
| intel | xeon_gold_5220s | - | |
| intel | xeon_gold_5220t | - | |
| intel | xeon_gold_5222 | - | |
| intel | xeon_gold_5315y | - | |
| intel | xeon_gold_5317 | - | |
| intel | xeon_gold_5318h | - | |
| intel | xeon_gold_5318n | - | |
| intel | xeon_gold_5318s | - | |
| intel | xeon_gold_5318y | - | |
| intel | xeon_gold_5320 | - | |
| intel | xeon_gold_5320h | - | |
| intel | xeon_gold_5320t | - | |
| intel | xeon_gold_6126 | - | |
| intel | xeon_gold_6126f | - | |
| intel | xeon_gold_6126t | - | |
| intel | xeon_gold_6128 | - | |
| intel | xeon_gold_6130 | - | |
| intel | xeon_gold_6130f | - | |
| intel | xeon_gold_6130t | - | |
| intel | xeon_gold_6132 | - | |
| intel | xeon_gold_6134 | - | |
| intel | xeon_gold_6136 | - | |
| intel | xeon_gold_6138 | - | |
| intel | xeon_gold_6138f | - | |
| intel | xeon_gold_6138p | - | |
| intel | xeon_gold_6138t | - | |
| intel | xeon_gold_6140 | - | |
| intel | xeon_gold_6142 | - | |
| intel | xeon_gold_6142f | - | |
| intel | xeon_gold_6144 | - | |
| intel | xeon_gold_6146 | - | |
| intel | xeon_gold_6148 | - | |
| intel | xeon_gold_6148f | - | |
| intel | xeon_gold_6150 | - | |
| intel | xeon_gold_6152 | - | |
| intel | xeon_gold_6154 | - | |
| intel | xeon_gold_6208u | - | |
| intel | xeon_gold_6209u | - | |
| intel | xeon_gold_6210u | - | |
| intel | xeon_gold_6212u | - | |
| intel | xeon_gold_6222v | - | |
| intel | xeon_gold_6226 | - | |
| intel | xeon_gold_6226r | - | |
| intel | xeon_gold_6230 | - | |
| intel | xeon_gold_6230n | - | |
| intel | xeon_gold_6230r | - | |
| intel | xeon_gold_6230t | - | |
| intel | xeon_gold_6234 | - | |
| intel | xeon_gold_6238 | - | |
| intel | xeon_gold_6238l | - | |
| intel | xeon_gold_6238r | - | |
| intel | xeon_gold_6238t | - | |
| intel | xeon_gold_6240 | - | |
| intel | xeon_gold_6240l | - | |
| intel | xeon_gold_6240r | - | |
| intel | xeon_gold_6240y | - | |
| intel | xeon_gold_6242 | - | |
| intel | xeon_gold_6242r | - | |
| intel | xeon_gold_6244 | - | |
| intel | xeon_gold_6246 | - | |
| intel | xeon_gold_6246r | - | |
| intel | xeon_gold_6248 | - | |
| intel | xeon_gold_6248r | - | |
| intel | xeon_gold_6250 | - | |
| intel | xeon_gold_6250l | - | |
| intel | xeon_gold_6252 | - | |
| intel | xeon_gold_6252n | - | |
| intel | xeon_gold_6254 | - | |
| intel | xeon_gold_6256 | - | |
| intel | xeon_gold_6258r | - | |
| intel | xeon_gold_6262v | - | |
| intel | xeon_gold_6312u | - | |
| intel | xeon_gold_6314u | - | |
| intel | xeon_gold_6326 | - | |
| intel | xeon_gold_6328h | - | |
| intel | xeon_gold_6328hl | - | |
| intel | xeon_gold_6330 | - | |
| intel | xeon_gold_6330h | - | |
| intel | xeon_gold_6330n | - | |
| intel | xeon_gold_6334 | - | |
| intel | xeon_gold_6336y | - | |
| intel | xeon_gold_6338 | - | |
| intel | xeon_gold_6338n | - | |
| intel | xeon_gold_6338t | - | |
| intel | xeon_gold_6342 | - | |
| intel | xeon_gold_6346 | - | |
| intel | xeon_gold_6348 | - | |
| intel | xeon_gold_6348h | - | |
| intel | xeon_gold_6354 | - | |
| intel | xeon_platinum_8153 | - | |
| intel | xeon_platinum_8156 | - | |
| intel | xeon_platinum_8158 | - | |
| intel | xeon_platinum_8160 | - | |
| intel | xeon_platinum_8160f | - | |
| intel | xeon_platinum_8160t | - | |
| intel | xeon_platinum_8164 | - | |
| intel | xeon_platinum_8168 | - | |
| intel | xeon_platinum_8170 | - | |
| intel | xeon_platinum_8176 | - | |
| intel | xeon_platinum_8176f | - | |
| intel | xeon_platinum_8180 | - | |
| intel | xeon_platinum_8253 | - | |
| intel | xeon_platinum_8256 | - | |
| intel | xeon_platinum_8260 | - | |
| intel | xeon_platinum_8260l | - | |
| intel | xeon_platinum_8260y | - | |
| intel | xeon_platinum_8268 | - | |
| intel | xeon_platinum_8270 | - | |
| intel | xeon_platinum_8276 | - | |
| intel | xeon_platinum_8276l | - | |
| intel | xeon_platinum_8280 | - | |
| intel | xeon_platinum_8280l | - | |
| intel | xeon_platinum_8351n | - | |
| intel | xeon_platinum_8352m | - | |
| intel | xeon_platinum_8352s | - | |
| intel | xeon_platinum_8352v | - | |
| intel | xeon_platinum_8352y | - | |
| intel | xeon_platinum_8353h | - | |
| intel | xeon_platinum_8354h | - | |
| intel | xeon_platinum_8356h | - | |
| intel | xeon_platinum_8358 | - | |
| intel | xeon_platinum_8358p | - | |
| intel | xeon_platinum_8360h | - | |
| intel | xeon_platinum_8360hl | - | |
| intel | xeon_platinum_8360y | - | |
| intel | xeon_platinum_8362 | - | |
| intel | xeon_platinum_8368 | - | |
| intel | xeon_platinum_8368q | - | |
| intel | xeon_platinum_8376h | - | |
| intel | xeon_platinum_8376hl | - | |
| intel | xeon_platinum_8380 | - | |
| intel | xeon_platinum_8380h | - | |
| intel | xeon_platinum_8380hl | - | |
| intel | xeon_platinum_9221 | - | |
| intel | xeon_platinum_9222 | - | |
| intel | xeon_platinum_9242 | - | |
| intel | xeon_platinum_9282 | - | |
| intel | xeon_silver_4108 | - | |
| intel | xeon_silver_4109t | - | |
| intel | xeon_silver_4110 | - | |
| intel | xeon_silver_4112 | - | |
| intel | xeon_silver_4114 | - | |
| intel | xeon_silver_4114t | - | |
| intel | xeon_silver_4116 | - | |
| intel | xeon_silver_4116t | - | |
| intel | xeon_silver_4208 | - | |
| intel | xeon_silver_4209t | - | |
| intel | xeon_silver_4210 | - | |
| intel | xeon_silver_4210r | - | |
| intel | xeon_silver_4210t | - | |
| intel | xeon_silver_4214 | - | |
| intel | xeon_silver_4214r | - | |
| intel | xeon_silver_4214y | - | |
| intel | xeon_silver_4215 | - | |
| intel | xeon_silver_4215r | - | |
| intel | xeon_silver_4216 | - | |
| intel | xeon_silver_4309y | - | |
| intel | xeon_silver_4310 | - | |
| intel | xeon_silver_4310t | - | |
| intel | xeon_silver_4314 | - | |
| intel | xeon_silver_4316 | - | |
| intel | xeon_w-10855m | - | |
| intel | xeon_w-10885m | - | |
| intel | xeon_w-11155mle | - | |
| intel | xeon_w-11155mre | - | |
| intel | xeon_w-11555mle | - | |
| intel | xeon_w-11555mre | - | |
| intel | xeon_w-11855m | - | |
| intel | xeon_w-11865mle | - | |
| intel | xeon_w-11865mre | - | |
| intel | xeon_w-11955m | - | |
| intel | xeon_w-1250 | - | |
| intel | xeon_w-1250e | - | |
| intel | xeon_w-1250p | - | |
| intel | xeon_w-1250te | - | |
| intel | xeon_w-1270 | - | |
| intel | xeon_w-1270e | - | |
| intel | xeon_w-1270p | - | |
| intel | xeon_w-1270te | - | |
| intel | xeon_w-1290 | - | |
| intel | xeon_w-1290e | - | |
| intel | xeon_w-1290p | - | |
| intel | xeon_w-1290t | - | |
| intel | xeon_w-1290te | - | |
| intel | xeon_w-1350 | - | |
| intel | xeon_w-1350p | - | |
| intel | xeon_w-1370 | - | |
| intel | xeon_w-1370p | - | |
| intel | xeon_w-1390 | - | |
| intel | xeon_w-1390p | - | |
| intel | xeon_w-1390t | - | |
| intel | xeon_w-2123 | - | |
| intel | xeon_w-2125 | - | |
| intel | xeon_w-2133 | - | |
| intel | xeon_w-2135 | - | |
| intel | xeon_w-2145 | - | |
| intel | xeon_w-2155 | - | |
| intel | xeon_w-2175 | - | |
| intel | xeon_w-2195 | - | |
| intel | xeon_w-2223 | - | |
| intel | xeon_w-2225 | - | |
| intel | xeon_w-2235 | - | |
| intel | xeon_w-2245 | - | |
| intel | xeon_w-2255 | - | |
| intel | xeon_w-2265 | - | |
| intel | xeon_w-2275 | - | |
| intel | xeon_w-2295 | - | |
| intel | xeon_w-3175x | - | |
| intel | xeon_w-3223 | - | |
| intel | xeon_w-3225 | - | |
| intel | xeon_w-3235 | - | |
| intel | xeon_w-3245 | - | |
| intel | xeon_w-3245m | - | |
| intel | xeon_w-3265 | - | |
| intel | xeon_w-3265m | - | |
| intel | xeon_w-3275 | - | |
| intel | xeon_w-3275m | - | |
| intel | xeon_w-3323 | - | |
| intel | xeon_w-3335 | - | |
| intel | xeon_w-3345 | - | |
| intel | xeon_w-3365 | - | |
| intel | xeon_w-3375 | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4003B029-36AE-47CD-BFB1-1F06DFEBA0C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FADF19F8-54BB-4BF4-BF1C-515EBBEE2060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B67D44E3-F8E1-4EB9-8D91-5777DC97D497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E4AC5E9-94DB-4970-BE29-747503AE81E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06FFA194-E200-4F4D-8E66-60D0134184E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B950F6FC-2848-45B7-9C28-B0DF46BC442B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDC4948-B063-4327-890A-C8D9F955C7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95101653-A2BF-47F5-A209-097CA98A91F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "226CBC16-EC2A-4498-ADB3-655A0E9CF396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9278297-5E4B-40D0-8782-E5AE87E43B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47568A4-117D-4E76-88DA-F8A4139A83D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F3324D-6E58-4233-A0C4-4F2C058E8D43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8448F47A-F956-4228-9A13-24AE86C532CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C4115F-E374-47E9-A81F-CC06FA72C67F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE81958E-5DFA-424C-9662-ECB1D9B738D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD67C284-EFCE-4530-8E68-42BB1B6F15C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C38AF3E-4547-4CA3-9078-6CBD372331AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BADEBE08-1478-4B88-9E06-5164BA0517DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D672383-B9AD-466E-8D6C-68DEC432B9A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D16BDFF3-4CC0-4423-8385-C5E49C941F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5523F4AF-8CCF-41B1-ADC8-D8363CE0A9D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F1B439-37B2-4425-8359-D3C86CD76BBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A121388-F0FF-420E-98E2-B6F4B53FF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83D5E36-BCA6-47A6-9C78-5A5FAD89F95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0242C717-1C3F-4D9E-B068-F3102A40E6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7F9109E-EADD-40F4-8360-BF7E37433E2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B9B3858-E58D-471E-8F12-DC109A133B81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D37104E-78E5-4368-B67F-1F8C63873C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F01770-A6AD-4F7B-8FD6-C066241A139B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30DFA368-60E2-42D7-9C59-04F61F1A1FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0974E563-6326-4E79-95FF-40625440696E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E904FB93-EFF6-4E8E-92F2-95C4952B0240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B232290-B3AD-4BB5-80B8-4CB3E6259A44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2607AB1-D851-4D83-9198-5B9A148E9B5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772568B9-C502-4154-9320-16D78BF60B34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "912614A7-45BA-411D-AE77-610EFE8D2A35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FBD651A-306D-4341-8DEE-2E928CA6E0EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61D61E39-79F5-4606-B196-D79A9C2C738C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8CE3D72-A3E6-4E8C-8673-D9265D66A449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A72E6F1-5A3C-4D8E-8F5F-0D92BC1CD8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A5BA20-2193-4C17-BBDC-8615D9333D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55240EF3-B56C-45DF-B868-6DF59A349E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD253CF-55F8-4350-AD79-6CB5526DEB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4266C712-B84F-45AD-B108-C890E073FA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9E14F8-2003-4D8F-A9E2-9633B478DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5E62D8-BA9C-48F6-B3B6-18DCA83D8C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC77BD1C-BB51-4FE4-83A1-B69E6371B15A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DF4072-DD12-41CC-8E18-E178BA3C8A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF0F0769-A572-4C23-BDB4-647CAEA8BF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E754A91A-7DBC-427B-A01F-9501D1A4668C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83610FBC-6D1E-465F-AFE3-625E951AE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4205855A-2A51-42EB-A5EF-4AD6DF409A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "035563B3-4F45-4B12-9F2C-C8ED678232FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F296558-643A-40A8-AD03-A88F70AC121D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F821873C-2F30-4D98-8570-5DDBDF5D3C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E6E09-671F-428A-A653-0E594FC2F5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0133C635-7981-470D-ADB3-92A9C884F273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A0BDFFB-638F-4FB7-A43A-812874D8774A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05C468AE-3FA8-48B5-A05C-0690F1019190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14CB46AD-0395-4675-9714-CCB2A180EBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5854EF2F-7B58-49FA-B09A-2066799E2F2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E474DFB1-4173-40B8-B02D-42AFC5C86F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DB5608-BEAB-4080-BD40-76C2FFB4DDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD7CD68D-6177-4F61-ABAF-C88453BD6C52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419680D5-21E0-491C-98AA-9D079213A020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57014B8E-5689-416B-9FE6-CE4A259E83C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3625E5-4583-4F38-B6E3-68FD20E54ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C365D42-1DEA-4FF2-86E4-1CC27E52E40E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFC6D19-9E02-4DE5-818F-931779A41F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA65F0A9-8BBE-4674-86B8-894484DC6C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2534F0E2-C427-4514-AE51-26EB0872B519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "998DCE68-F426-47C5-80F7-BFE42FD69DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "917B3772-3856-4C63-9DC8-FE887A93CB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE04ADB-3037-41E8-8DF4-8588FDFB759A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CBF8567-4F5B-4142-9A3B-BD6AEE33595F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8EA870-2228-4E81-A417-30E040A5C0E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "656D31B6-1E8D-4A44-9D7A-023051E7050A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49EEE5AA-3867-4137-B165-5004C34C77B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A38417-1DB2-4C85-80D9-D3968BF7A83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F99F83-A7E6-4AFD-BC42-7348EF6613AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A62A9F4-2B98-4F2D-9143-08D1689E38AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FD06CB-F456-44BD-900B-06131DC68B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9044310E-4DF9-47BA-9D05-C1405DC8CDB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA881CDA-1C16-43F1-A7D5-69502512A21C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B43E11E-5350-4DDB-A743-F84D4D2286D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9761E8-7978-4141-94B5-EEFE7C00BC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF44A7C9-834B-49DF-B1B6-B1575473179B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32E6092-1AF6-499F-B176-F575E766E8F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F309BC-6F31-490C-982B-14F9319276F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BF12F06-D672-40BF-B7A6-1DA3711136F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D196C46-0F17-4C42-A232-B12CE85D9641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3B40170-C992-4386-8429-52A216F64384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9219B34E-F94C-4ECA-85E5-850EBD0F41A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD02FD9-8E63-4B79-8878-07C4316981C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "725E953B-CD85-4451-8D18-40E8D80479AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "196C11A9-1A63-49A0-918F-4A3F9293FAF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D5A42E1-5CC9-4165-8809-69FB6DF12AD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C753C7B-BB62-41C9-BF21-8C653B433FAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una administraci\u00f3n no suficiente del flujo de control en algunos procesadores Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por acceso local"
    }
  ],
  "id": "CVE-2021-0127",
  "lastModified": "2025-05-05T17:16:42.773",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-02-09T23:15:13.817",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  suse-su-2022:0576-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ucode-intel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-576,SUSE-SLE-SERVER-12-SP5-2022-576",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0576-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0576-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220576-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0576-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192615",
        "url": "https://bugzilla.suse.com/1192615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195779",
        "url": "https://bugzilla.suse.com/1195779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195780",
        "url": "https://bugzilla.suse.com/1195780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195781",
        "url": "https://bugzilla.suse.com/1195781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "Security update for ucode-intel",
    "tracking": {
      "current_release_date": "2022-02-25T16:00:37Z",
      "generator": {
        "date": "2022-02-25T16:00:37Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0576-1",
      "initial_release_date": "2022-02-25T16:00:37Z",
      "revision_history": [
        {
          "date": "2022-02-25T16:00:37Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-3.38.1.i586",
                "product": {
                  "name": "ucode-intel-20220207-3.38.1.i586",
                  "product_id": "ucode-intel-20220207-3.38.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-3.38.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-3.38.1.x86_64",
                  "product_id": "ucode-intel-20220207-3.38.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.38.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.38.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20220207-3.38.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20220207-3.38.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  suse-su-2022:0541-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ucode-intel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-541,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-541,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-541,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-541,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-541,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-541,SUSE-Storage-6-2022-541",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0541-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0541-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220541-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0541-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192615",
        "url": "https://bugzilla.suse.com/1192615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195779",
        "url": "https://bugzilla.suse.com/1195779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195780",
        "url": "https://bugzilla.suse.com/1195780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195781",
        "url": "https://bugzilla.suse.com/1195781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "Security update for ucode-intel",
    "tracking": {
      "current_release_date": "2022-02-21T12:49:07Z",
      "generator": {
        "date": "2022-02-21T12:49:07Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0541-1",
      "initial_release_date": "2022-02-21T12:49:07Z",
      "revision_history": [
        {
          "date": "2022-02-21T12:49:07Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-3.206.1.i586",
                "product": {
                  "name": "ucode-intel-20220207-3.206.1.i586",
                  "product_id": "ucode-intel-20220207-3.206.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-3.206.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-3.206.1.x86_64",
                  "product_id": "ucode-intel-20220207-3.206.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 6",
                "product": {
                  "name": "SUSE Enterprise Storage 6",
                  "product_id": "SUSE Enterprise Storage 6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.206.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.206.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.206.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.206.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.206.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.206.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.206.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.206.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.206.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.206.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.206.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.206.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-21T12:49:07Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-21T12:49:07Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-21T12:49:07Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:ucode-intel-20220207-3.206.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:ucode-intel-20220207-3.206.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-21T12:49:07Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  suse-su-2022:0502-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ucode-intel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-502,SUSE-SLE-Product-HPC-15-2022-502,SUSE-SLE-Product-SLES_SAP-15-2022-502",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0502-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0502-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220502-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0502-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192615",
        "url": "https://bugzilla.suse.com/1192615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195779",
        "url": "https://bugzilla.suse.com/1195779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195780",
        "url": "https://bugzilla.suse.com/1195780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195781",
        "url": "https://bugzilla.suse.com/1195781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "Security update for ucode-intel",
    "tracking": {
      "current_release_date": "2022-02-18T09:54:06Z",
      "generator": {
        "date": "2022-02-18T09:54:06Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0502-1",
      "initial_release_date": "2022-02-18T09:54:06Z",
      "revision_history": [
        {
          "date": "2022-02-18T09:54:06Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-3.70.1.i586",
                "product": {
                  "name": "ucode-intel-20220207-3.70.1.i586",
                  "product_id": "ucode-intel-20220207-3.70.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-3.70.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-3.70.1.x86_64",
                  "product_id": "ucode-intel-20220207-3.70.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.70.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.70.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.70.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.70.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-3.70.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-18T09:54:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-18T09:54:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-18T09:54:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20220207-3.70.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20220207-3.70.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-18T09:54:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  suse-su-2022:0574-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ucode-intel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-574,SUSE-SLE-Module-Basesystem-15-SP3-2022-574,SUSE-SLE-Module-Basesystem-15-SP4-2022-574,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-574,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-574,SUSE-SLE-Product-RT-15-SP2-2022-574,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-574,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-574,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-574,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-574,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-574,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-574,SUSE-SUSE-MicroOS-5.0-2022-574,SUSE-SUSE-MicroOS-5.1-2022-574,SUSE-Storage-7-2022-574",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0574-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0574-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220574-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0574-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192615",
        "url": "https://bugzilla.suse.com/1192615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195779",
        "url": "https://bugzilla.suse.com/1195779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195780",
        "url": "https://bugzilla.suse.com/1195780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195781",
        "url": "https://bugzilla.suse.com/1195781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "Security update for ucode-intel",
    "tracking": {
      "current_release_date": "2022-02-25T15:59:46Z",
      "generator": {
        "date": "2022-02-25T15:59:46Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0574-1",
      "initial_release_date": "2022-02-25T15:59:46Z",
      "revision_history": [
        {
          "date": "2022-02-25T15:59:46Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-10.1.i586",
                "product": {
                  "name": "ucode-intel-20220207-10.1.i586",
                  "product_id": "ucode-intel-20220207-10.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-10.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-10.1.x86_64",
                  "product_id": "ucode-intel-20220207-10.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Real Time 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Real Time 15 SP2",
                  "product_id": "SUSE Linux Enterprise Real Time 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_rt:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.1",
                "product": {
                  "name": "SUSE Manager Proxy 4.1",
                  "product_id": "SUSE Manager Proxy 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Retail Branch Server 4.1",
                "product": {
                  "name": "SUSE Manager Retail Branch Server 4.1",
                  "product_id": "SUSE Manager Retail Branch Server 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.1",
                "product": {
                  "name": "SUSE Manager Server 4.1",
                  "product_id": "SUSE Manager Server 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.0",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.0",
                  "product_id": "SUSE Linux Enterprise Micro 5.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 7",
                "product": {
                  "name": "SUSE Enterprise Storage 7",
                  "product_id": "SUSE Enterprise Storage 7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
          "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Real Time 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:ucode-intel-20220207-10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Proxy 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:ucode-intel-20220207-10.1.x86_64",
            "SUSE Manager Server 4.1:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:46Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  suse-su-2022:0575-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ucode-intel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "HPE-Helion-OpenStack-8-2022-575,SUSE-2022-575,SUSE-OpenStack-Cloud-8-2022-575,SUSE-OpenStack-Cloud-9-2022-575,SUSE-OpenStack-Cloud-Crowbar-8-2022-575,SUSE-OpenStack-Cloud-Crowbar-9-2022-575,SUSE-SLE-SAP-12-SP3-2022-575,SUSE-SLE-SAP-12-SP4-2022-575,SUSE-SLE-SERVER-12-SP2-BCL-2022-575,SUSE-SLE-SERVER-12-SP3-2022-575,SUSE-SLE-SERVER-12-SP3-BCL-2022-575,SUSE-SLE-SERVER-12-SP4-LTSS-2022-575",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0575-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0575-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220575-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0575-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192615",
        "url": "https://bugzilla.suse.com/1192615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195779",
        "url": "https://bugzilla.suse.com/1195779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195780",
        "url": "https://bugzilla.suse.com/1195780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195781",
        "url": "https://bugzilla.suse.com/1195781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "Security update for ucode-intel",
    "tracking": {
      "current_release_date": "2022-02-25T16:00:30Z",
      "generator": {
        "date": "2022-02-25T16:00:30Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0575-1",
      "initial_release_date": "2022-02-25T16:00:30Z",
      "revision_history": [
        {
          "date": "2022-02-25T16:00:30Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-13.93.1.i586",
                "product": {
                  "name": "ucode-intel-20220207-13.93.1.i586",
                  "product_id": "ucode-intel-20220207-13.93.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-13.93.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-13.93.1.x86_64",
                  "product_id": "ucode-intel-20220207-13.93.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "HPE Helion OpenStack 8",
                "product": {
                  "name": "HPE Helion OpenStack 8",
                  "product_id": "HPE Helion OpenStack 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:hpe-helion-openstack:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 8",
                "product": {
                  "name": "SUSE OpenStack Cloud 8",
                  "product_id": "SUSE OpenStack Cloud 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 9",
                "product": {
                  "name": "SUSE OpenStack Cloud 9",
                  "product_id": "SUSE OpenStack Cloud 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 8",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 8",
                  "product_id": "SUSE OpenStack Cloud Crowbar 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 9",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 9",
                  "product_id": "SUSE OpenStack Cloud Crowbar 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-13.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-13.93.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:30Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:30Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:30Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud 9:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20220207-13.93.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:ucode-intel-20220207-13.93.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T16:00:30Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  opensuse-su-2024:11840-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "ucode-intel-20220207-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the ucode-intel-20220207-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-11840",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11840-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "ucode-intel-20220207-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:11840-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-1.1.aarch64",
                "product": {
                  "name": "ucode-intel-20220207-1.1.aarch64",
                  "product_id": "ucode-intel-20220207-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-1.1.ppc64le",
                "product": {
                  "name": "ucode-intel-20220207-1.1.ppc64le",
                  "product_id": "ucode-intel-20220207-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-1.1.s390x",
                "product": {
                  "name": "ucode-intel-20220207-1.1.s390x",
                  "product_id": "ucode-intel-20220207-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-1.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-1.1.x86_64",
                  "product_id": "ucode-intel-20220207-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64"
        },
        "product_reference": "ucode-intel-20220207-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le"
        },
        "product_reference": "ucode-intel-20220207-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x"
        },
        "product_reference": "ucode-intel-20220207-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
          "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.aarch64",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.ppc64le",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.s390x",
            "openSUSE Tumbleweed:ucode-intel-20220207-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  opensuse-su-2022:0574-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ucode-intel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2022-574,openSUSE-SLE-15.4-2022-574",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0574-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2022:0574-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2022:0574-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192615",
        "url": "https://bugzilla.suse.com/1192615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195779",
        "url": "https://bugzilla.suse.com/1195779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195780",
        "url": "https://bugzilla.suse.com/1195780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195781",
        "url": "https://bugzilla.suse.com/1195781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0127 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0145 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0146 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33120 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33120/"
      }
    ],
    "title": "Security update for ucode-intel",
    "tracking": {
      "current_release_date": "2022-02-25T15:59:33Z",
      "generator": {
        "date": "2022-02-25T15:59:33Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2022:0574-1",
      "initial_release_date": "2022-02-25T15:59:33Z",
      "revision_history": [
        {
          "date": "2022-02-25T15:59:33Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ucode-intel-20220207-10.1.x86_64",
                "product": {
                  "name": "ucode-intel-20220207-10.1.x86_64",
                  "product_id": "ucode-intel-20220207-10.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ucode-intel-20220207-10.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
        },
        "product_reference": "ucode-intel-20220207-10.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0127",
          "url": "https://www.suse.com/security/cve/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195779 for CVE-2021-0127",
          "url": "https://bugzilla.suse.com/1195779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0145",
          "url": "https://www.suse.com/security/cve/CVE-2021-0145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195780 for CVE-2021-0145",
          "url": "https://bugzilla.suse.com/1195780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-0146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0146",
          "url": "https://www.suse.com/security/cve/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192615 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1192615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193500 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1193500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200661 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200663 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1200663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205062 for CVE-2021-0146",
          "url": "https://bugzilla.suse.com/1205062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0146"
    },
    {
      "cve": "CVE-2021-33120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33120",
          "url": "https://www.suse.com/security/cve/CVE-2021-33120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195781 for CVE-2021-33120",
          "url": "https://bugzilla.suse.com/1195781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:ucode-intel-20220207-10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-25T15:59:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33120"
    }
  ]
}
  var-202202-0094
Vulnerability from variot
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. plural Intel(R) Processor There is an unspecified vulnerability in the firmware.Denial of service (DoS) It may be put into a state. ========================================================================== Ubuntu Security Notice USN-5535-1 July 28, 2022
Intel Microcode vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
Several security issues were fixed in Intel Microcode.
Software Description: - intel-microcode: Processor microcode for Intel CPUs
Details:
Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. (CVE-2021-0145)
Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-0127)
It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123, CVE-2022-21127)
It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125)
Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that some Intel processors improperly optimised security-critical code. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21151)
It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166)
It was discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information. (CVE-2021-33117)
Brandon Miller discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information or a remote attacker could use this to cause a denial of service (system crash). (CVE-2021-33120)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: intel-microcode 3.20220510.0ubuntu0.16.04.1+esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5535-1 CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117, CVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21151, CVE-2022-21166 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202402-22
                                       https://security.gentoo.org/
Severity: High Title: intel-microcode: Multiple Vulnerabilities Date: February 19, 2024 Bugs: #832985, #894474 ID: 202402-22
Synopsis
Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation.
Background
Intel IA32/IA64 microcode update data.
Affected packages
Package Vulnerable Unaffected
sys-firmware/intel-microcode < 20230214_p20230212 >= 20230214_p20230212
Description
Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All intel-microcode users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-firmware/intel-microcode-20230214_p20230212"
References
[ 1 ] CVE-2021-0127 https://nvd.nist.gov/vuln/detail/CVE-2021-0127 [ 2 ] CVE-2021-0146 https://nvd.nist.gov/vuln/detail/CVE-2021-0146
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202402-22
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0094",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "core i7-8706g",
        "scope": "eq",
        "trust": 2.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8360y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7100t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2254me",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-8250u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10100t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1120g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9100hl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1567",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6330",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1533n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6138p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6140",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6700te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11900kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2195",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6238",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2146g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8256",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g3930e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6350hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9900ks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6152",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8380hl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6144",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6822eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1518",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6258r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1160g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9900kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7820eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2334",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8380h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10750h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10305t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1541",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5115",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6142",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8380",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7020u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9920x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10500h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9940x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6148f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9300h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6820hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6262v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6208u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6126t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8559u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2141i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6100t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10210u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5218t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6700hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8665ue",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6500te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11390h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6560u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1505m v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6154",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8164",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7101e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4114",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11700t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-7920x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1539",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2295",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11370h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1235l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11865mre",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1250p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1585l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 9282",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-5820k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6400te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2254ml",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9900k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10400h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6250l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4209t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1245 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "clustered data ontap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "core i5-11600k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6254",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-11100he",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6685r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11700kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4310t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8358p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4214y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4215r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2133",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2123",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3323",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g7400te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6267u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6210u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7167u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11955m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1005g1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11900f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1140g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2388g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1268l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6226",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1250e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1145gre",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4114t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-8350u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10510u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1155g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7360u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9850he",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1125g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10710u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6212u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11400f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8358",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6157u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2274g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1390",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1030g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 9221",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1115g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8376h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3175x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6128",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1350",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1180g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1553n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11800h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2356g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8168",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9100t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8160t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11260h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8750h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6230t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6650u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6328hl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2226ge",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7800x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2314",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11700k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6230r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1185g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2255",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7440eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7660u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6660u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1505l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11950h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-5930k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6505t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7300u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1557",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1577",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1280 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8176",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8140u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10850k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g3930te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6600u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1035g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7920hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10885h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8352s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1270",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6200u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6209u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8368q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9500te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-4930k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8362",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11155mle",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6405t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1515m v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1540",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-3820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1270 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9800x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2225",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11600kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7287u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6244",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8160f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11555mle",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3265",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7700t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2124g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10100y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6167u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7y54",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7567u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1610",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7y75",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6138f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8352m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9300t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10500te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1000g1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10810u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6950x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4116t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2145nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6126",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8351n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1610t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5120t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5218n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5220t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7700hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6246",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8368",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8268",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4316",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1370p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6138",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5118",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2155",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11850h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2224g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10310y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2386g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4310",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1370",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6230",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8360h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6238t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5420",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6240y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6300t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1290e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10850h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8569u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-8400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2142it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6132",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8705g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3225",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3235",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g7400e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon bronze 3104",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11320h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2146nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6820eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9750h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6700t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6130t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2125",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2324g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1585 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6700k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4216",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6312u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11400h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4208",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10300h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3275m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10600kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 4425y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7600k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6402p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7102e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9600kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g7400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6240r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11500h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10870h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6328h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1535m v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4314",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1623n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8145u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8352y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3365",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6102e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6226r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8650u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1571",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7820hk",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7400",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1537",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6234",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1830",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8100h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6770hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6338n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3375",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2183it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2235",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1622",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6500u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7100u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5222",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6238r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1501l v6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2145",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1390t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1820te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1637",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2276me",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11855m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1065g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10105t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3223",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 7505",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8565u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9100e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8850h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2161i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2278g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-3930k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2174g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5320t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2135",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9350kf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8280l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8360hl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1390p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7300t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6360u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10400f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2224",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9900x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2123it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2144g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1531",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6442eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4109t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8276l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4116",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-8600k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8276",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6260u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2136",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10980xe",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7500u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6240l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1115g4e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-3960x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10110y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10310u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6354",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7y57",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8300t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1230 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1195g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6300u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3265m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11900h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10500e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1035g1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 4415y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8160",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6342",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9400f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8100t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6248r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7700k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8354h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2245",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2186g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10325",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2226g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 9222",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-4930mx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1501m v6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11980hk",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2278gel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6256",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10100e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9850h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6100e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6900k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8700t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11900k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10100te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6600k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6330n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1528",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8376hl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8350k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-7940x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1115gre",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1558l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10200h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6850k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1145g7e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9880h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6348",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1633n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4214",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5215l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8156",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2286m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8153",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1290",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6870hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1275 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9300hf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1135g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-4940mx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 4415u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4309y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 6500y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-3970x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5420t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1559",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9900t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1653n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1527",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6138t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2286g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2163it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10105f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6346",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11375h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-5960x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3275",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5318h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1260l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1185g7e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9350k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6100te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9960x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7350k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8550u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5318y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6230n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1820t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5315y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6314u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2176g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6970hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6248",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2124",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1270e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7130u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6134",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3245m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4108",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1220 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8356h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1030g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6505",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2275",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10610u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon bronze 3204",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2378g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1225 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6130f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2166nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6287u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1620",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10105",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6100h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1068ng7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6006u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 5405u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6820hk",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6300hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10875h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10940x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7100h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-7980xe",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8809g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-7900x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5120",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2175",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8176f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10600k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6148",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11300h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7100e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6785r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1290p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7200u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8170",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10980hk",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7267u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10510y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3345",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5220s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6246r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g7400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5320h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2278ge",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6126f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6326",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9100f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9980xe",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7560u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1545m v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1060g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4112",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11555mre",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6336y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8665u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11850he",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1578l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6142f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-3920xm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1523n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6600t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6238l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2236",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8100b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2336",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1240 v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6242r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2265",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5220r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6567u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10300t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1270te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-10885m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10110u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8260y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3335",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9500e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8260",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6338t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4210t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2234",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9500f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7260u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-4820k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1035g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6130",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "celeron g1620t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g5400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11500he",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1240l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10505",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2378",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6240",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9400t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8700b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11865mle",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2177nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7440hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6800k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1649n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon bronze 3206r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7442eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9900",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8253",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1290t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 9242",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11700f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8145ue",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2126g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-8305g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2374g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8700k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6100u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-7101te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-3245",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2186m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2276m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1543n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2187nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5318s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6585r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1250te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 4410y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1145g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7820x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11900",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9600k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2176m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5317",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2276g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-2223",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10210y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1565l v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7640x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5318n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6334",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1000g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1290te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon bronze 3106",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1513n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5217",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7740x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-10600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9850hl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10920x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9980hk",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6440hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1350p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-7300hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1185gre",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11600h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2143it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-11700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6405",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2288g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8500y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8280",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1529",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6252",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-9100te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-7960x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5218b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5122",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold g6400e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-10700te",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-6440eq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9750hf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6252n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2134",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-4960x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1627",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8709g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8109u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-1165g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-1110g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8352v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1548",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8557u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6330h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8260l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-11155mre",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1130g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6348h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8180",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8353h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-9700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6338",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5218r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1521",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-6098p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-10855m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8086k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4210r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7820hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6146",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-3940xm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10100f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4110",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2276ml",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2244g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6136",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6242",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 6405u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e3-1575m v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8158",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-11500t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "pentium gold 4417u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1602",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2173it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5119t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9400h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-1038ng7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-10305",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver 4214r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-6920hq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-8700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 6222v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-11900t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i3-8130u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5220",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-10900x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon e-2246g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i7-7600u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon gold 5218",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i9-9820x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon w-1270p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum 8270",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "core i5-9600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "clustered data ontap",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "celeron g1820te",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1620",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1610",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1610t",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1620t",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1630",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1820t",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "celeron g1820",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "ha8000v \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "celeron g1830",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "db": "PACKETSTORM",
        "id": "167862"
      }
    ],
    "trust": 0.2
  },
  "cve": "CVE-2021-0127",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-0127",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-371696",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "id": "CVE-2021-0127",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2021-0127",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-0127",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-0127",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202202-655",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-371696",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-0127",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. plural  Intel(R) Processor There is an unspecified vulnerability in the firmware.Denial of service  (DoS) It may be put into a state. ==========================================================================\nUbuntu Security Notice USN-5535-1\nJuly 28, 2022\n\nIntel Microcode vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in Intel Microcode. \n\nSoftware Description:\n- intel-microcode: Processor microcode for Intel CPUs\n\nDetails:\n\nJoseph Nuzman discovered that some Intel processors did not properly\ninitialise shared resources. A local attacker could use this to obtain\nsensitive information. (CVE-2021-0145)\n\nMark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel\nprocessors did not prevent test and debug logic from being activated at\nruntime. A local attacker could use this to escalate\nprivileges. A local attacker could use this to cause a denial\nof service (system crash). (CVE-2021-0127)\n\nIt was discovered that some Intel processors did not completely perform\ncleanup actions on multi-core shared buffers. A local attacker could\npossibly use this to expose sensitive information. (CVE-2022-21123,\nCVE-2022-21127)\n\nIt was discovered that some Intel processors did not completely perform\ncleanup actions on microarchitectural fill buffers. A local attacker could\npossibly use this to expose sensitive information. (CVE-2022-21125)\n\nAlysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that\nsome Intel processors improperly optimised security-critical code. A local\nattacker could possibly use this to expose sensitive\ninformation. (CVE-2022-21151)\n\nIt was discovered that some Intel processors did not properly perform\ncleanup during specific special register write operations. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2022-21166)\n\nIt was discovered that some Intel processors did not properly restrict\naccess in some situations. A local attacker could use this to obtain\nsensitive information. (CVE-2021-33117)\n\nBrandon Miller discovered that some Intel processors did not properly\nrestrict access in some situations. A local attacker could use this to\nobtain sensitive information or a remote attacker could use this to\ncause a denial of service (system crash). (CVE-2021-33120)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 ESM:\nintel-microcode 3.20220510.0ubuntu0.16.04.1+esm1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\nhttps://ubuntu.com/security/notices/USN-5535-1\nCVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117,\nCVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127,\nCVE-2022-21151, CVE-2022-21166\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 202402-22\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: intel-microcode: Multiple Vulnerabilities\n     Date: February 19, 2024\n     Bugs: #832985, #894474\n       ID: 202402-22\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in intel-microcode, the\nworst of which can lead to privilege escalation. \n\nBackground\n==========\n\nIntel IA32/IA64 microcode update data. \n\nAffected packages\n=================\n\nPackage                       Vulnerable            Unaffected\n----------------------------  --------------------  ---------------------\nsys-firmware/intel-microcode  \u003c 20230214_p20230212  \u003e= 20230214_p20230212\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in NVIDIA Drivers. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll intel-microcode users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=sys-firmware/intel-microcode-20230214_p20230212\"\n\nReferences\n==========\n\n[ 1 ] CVE-2021-0127\n      https://nvd.nist.gov/vuln/detail/CVE-2021-0127\n[ 2 ] CVE-2021-0146\n      https://nvd.nist.gov/vuln/detail/CVE-2021-0146\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202402-22\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2024 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "db": "PACKETSTORM",
        "id": "167862"
      },
      {
        "db": "PACKETSTORM",
        "id": "177180"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-0127",
        "trust": 3.7
      },
      {
        "db": "PACKETSTORM",
        "id": "167862",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "167553",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU99045838",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2023.2479",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0755",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0535",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0833",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1166",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6332",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0739",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3019",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3692",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0835",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022031814",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022021007",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022062041",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-77639",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-371696",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0127",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "177180",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "db": "PACKETSTORM",
        "id": "167862"
      },
      {
        "db": "PACKETSTORM",
        "id": "177180"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "id": "VAR-202202-0094",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371696"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T12:48:52.143000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "hitachi-sec-2022-207",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
      },
      {
        "title": "Intel Processors BIOS firmware Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=182455"
      },
      {
        "title": "Red Hat: CVE-2021-0127",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-0127"
      },
      {
        "title": "Ubuntu Security Notice: USN-5486-1: Intel Microcode vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5486-1"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2022-1762",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2022-1762"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
      },
      {
        "trust": 1.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
      },
      {
        "trust": 1.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0127"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu99045838/"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2021-0127"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3019"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/167862/ubuntu-security-notice-usn-5535-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1166"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022031814"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022021007"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2023.2479"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/intel-processor-denial-of-service-via-breakpoint-control-flow-37499"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6332"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-77639"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0739"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3692"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0835"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022062041"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/167553/ubuntu-security-notice-usn-5486-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0833"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0535"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0755"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0146"
      },
      {
        "trust": 0.2,
        "url": "https://ubuntu.com/security/notices/usn-5486-1"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21166"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33120"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0145"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33117"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21151"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21127"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.21.10.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.22.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.20.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5535-1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21125"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21123"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/glsa/202402-22"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://creativecommons.org/licenses/by-sa/2.5"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "db": "PACKETSTORM",
        "id": "167862"
      },
      {
        "db": "PACKETSTORM",
        "id": "177180"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "db": "PACKETSTORM",
        "id": "167862"
      },
      {
        "db": "PACKETSTORM",
        "id": "177180"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "date": "2022-02-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "date": "2022-03-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "date": "2022-06-20T16:27:17",
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "date": "2022-07-28T14:56:22",
        "db": "PACKETSTORM",
        "id": "167862"
      },
      {
        "date": "2024-02-19T14:26:17",
        "db": "PACKETSTORM",
        "id": "177180"
      },
      {
        "date": "2022-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      },
      {
        "date": "2022-02-09T23:15:13.817000",
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-371696"
      },
      {
        "date": "2022-02-15T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-0127"
      },
      {
        "date": "2022-03-09T03:20:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      },
      {
        "date": "2023-05-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      },
      {
        "date": "2023-08-08T14:21:49.707000",
        "db": "NVD",
        "id": "CVE-2021-0127"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "167553"
      },
      {
        "db": "PACKETSTORM",
        "id": "167862"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0Intel(R)\u00a0Processor\u00a0 Firmware vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-001396"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202202-655"
      }
    ],
    "trust": 0.6
  }
}
  ghsa-mqcr-p73p-f4gw
Vulnerability from github
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.
{
  "affected": [],
  "aliases": [
    "CVE-2021-0127"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-02-09T23:15:00Z",
    "severity": "MODERATE"
  },
  "details": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
  "id": "GHSA-mqcr-p73p-f4gw",
  "modified": "2025-05-05T18:31:23Z",
  "published": "2022-02-11T00:01:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0127"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20220210-0008"
    },
    {
      "type": "WEB",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  icsa-23-122-01
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Mitsubishi Electric",
        "summary": "reporting these vulnerabilities to CISA"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
        "title": "CISA Disclaimer"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "summary",
        "text": "Successful exploitation of these vulnerabilities could allow a malicious attacker to escalate privileges, disclose parameter information in the affected products, and cause a denial-of-service condition.",
        "title": "Risk evaluation"
      },
      {
        "category": "other",
        "text": "Critical Manufacturing",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Japan",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA recommends users take the following measures to protect themselves from social engineering attacks:",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Do not click web links or open attachments in unsolicited email messages.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. These vulnerabilities have a high attack complexity.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-122-01 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-122-01.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-122-01 Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-122-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/ics/Recommended-Practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://cisa.gov/ics"
      }
    ],
    "title": "Mitsubishi Electric Factory Automation Products",
    "tracking": {
      "current_release_date": "2023-05-02T18:41:30.488188Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-23-122-01",
      "initial_release_date": "2023-05-02T18:41:30.488188Z",
      "revision_history": [
        {
          "date": "2023-05-02T18:41:30.488188Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "CSAF Creation Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI5122-VM: *",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI5122-VM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI1002-W: *",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI1002-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI2012-W: *",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI2012-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI3321G-W: *",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI3321G-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI3315G-W: *",
                  "product_id": "CSAFPID-0005"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI3315G-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC iQ-R R102WCPU-W: *",
                  "product_id": "CSAFPID-0006"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-R R102WCPU-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q24DHCCPU-V: *",
                  "product_id": "CSAFPID-0007"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q24DHCCPU-V"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q24DHCCPU-VG: *",
                  "product_id": "CSAFPID-0008"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q24DHCCPU-VG"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q24DHCCPU-LS: *",
                  "product_id": "CSAFPID-0009"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q24DHCCPU-LS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q26DHCCPU-LS: *",
                  "product_id": "CSAFPID-00010"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q26DHCCPU-LS"
          }
        ],
        "category": "vendor",
        "name": "Mitsubishi Electric"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0002",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2022-0002 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2022-0002 - INTEL-SA-00598",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html?wapkw=CVE-2022-0002"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-33150",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-33150 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is  (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33150"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-33150 - INTEL-SA-00609",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html?wapkw=CVE-2021-33150"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0127",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. CVE-2021-0127 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0127 - INTEL-SA-00532",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html?wapkw=CVE-2021-0127"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0086",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Observable response discrepancy in floating-point operations for some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0086 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0086"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0086 - INTEL-SA-00516",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0089",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0089 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0089"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0089 - INTEL-SA-00516",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0146",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-0146 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is  (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0146 - INTEL-SA-00528",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2020-24512",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-24512 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2020-24512 - INTEL-SA-00464",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html?wapkw=CVE-2020-24512"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2020-8670",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is  (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8670"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2020-8670 \u2014 INTEL-SA-00463",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html?wapkw=CVE-2020-8670"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2020-24489",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-24489 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2020-24489 - INTEL-SA-00442",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html?wapkw=CVE-2020-24489"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    }
  ]
}
  ICSA-23-122-01
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Mitsubishi Electric",
        "summary": "reporting these vulnerabilities to CISA"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
        "title": "CISA Disclaimer"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "summary",
        "text": "Successful exploitation of these vulnerabilities could allow a malicious attacker to escalate privileges, disclose parameter information in the affected products, and cause a denial-of-service condition.",
        "title": "Risk evaluation"
      },
      {
        "category": "other",
        "text": "Critical Manufacturing",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Japan",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA recommends users take the following measures to protect themselves from social engineering attacks:",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Do not click web links or open attachments in unsolicited email messages.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. These vulnerabilities have a high attack complexity.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-122-01 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-122-01.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-122-01 Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-122-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/ics/Recommended-Practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://cisa.gov/ics"
      }
    ],
    "title": "Mitsubishi Electric Factory Automation Products",
    "tracking": {
      "current_release_date": "2023-05-02T18:41:30.488188Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-23-122-01",
      "initial_release_date": "2023-05-02T18:41:30.488188Z",
      "revision_history": [
        {
          "date": "2023-05-02T18:41:30.488188Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "CSAF Creation Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI5122-VM: *",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI5122-VM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI1002-W: *",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI1002-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI2012-W: *",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI2012-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI3321G-W: *",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI3321G-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELIPC MI3315G-W: *",
                  "product_id": "CSAFPID-0005"
                }
              }
            ],
            "category": "product_name",
            "name": "MELIPC MI3315G-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC iQ-R R102WCPU-W: *",
                  "product_id": "CSAFPID-0006"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-R R102WCPU-W"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q24DHCCPU-V: *",
                  "product_id": "CSAFPID-0007"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q24DHCCPU-V"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q24DHCCPU-VG: *",
                  "product_id": "CSAFPID-0008"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q24DHCCPU-VG"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q24DHCCPU-LS: *",
                  "product_id": "CSAFPID-0009"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q24DHCCPU-LS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "MELSEC Q Q26DHCCPU-LS: *",
                  "product_id": "CSAFPID-00010"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC Q Q26DHCCPU-LS"
          }
        ],
        "category": "vendor",
        "name": "Mitsubishi Electric"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0002",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2022-0002 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2022-0002 - INTEL-SA-00598",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html?wapkw=CVE-2022-0002"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-33150",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-33150 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is  (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33150"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-33150 - INTEL-SA-00609",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html?wapkw=CVE-2021-33150"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0127",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. CVE-2021-0127 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0127"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0127 - INTEL-SA-00532",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html?wapkw=CVE-2021-0127"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0086",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Observable response discrepancy in floating-point operations for some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0086 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0086"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0086 - INTEL-SA-00516",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0089",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. CVE-2021-0089 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0089"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0089 - INTEL-SA-00516",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2021-0146",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2021-0146 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is  (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0146"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2021-0146 - INTEL-SA-00528",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2020-24512",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-24512 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2020-24512 - INTEL-SA-00464",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html?wapkw=CVE-2020-24512"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2020-8670",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is  (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8670"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2020-8670 \u2014 INTEL-SA-00463",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html?wapkw=CVE-2020-8670"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2020-24489",
      "cwe": {
        "id": "CWE-1395",
        "name": "Dependency on Vulnerable Third-Party Component"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-24489 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is  (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-00010"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends users refer to the following Intel advisories to assist in mitigating these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "CVE-2020-24489 - INTEL-SA-00442",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html?wapkw=CVE-2020-24489"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric recommends that users take the following mitigation measures to minimize the risk of exploiting these vulnerabilities:",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Restrict physical access to the product from unauthorized users.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "For additional information, refer to Mitsubishi Electric\u2019s bulletin.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-001_en.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-00010"
          ]
        }
      ]
    }
  ]
}
  CERTFR-2022-AVI-127
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Se r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur pour la liste compl\u00e8te des produits affect\u00e9s",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-21218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21218"
    },
    {
      "name": "CVE-2021-0119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0119"
    },
    {
      "name": "CVE-2022-21133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21133"
    },
    {
      "name": "CVE-2021-0076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
    },
    {
      "name": "CVE-2021-0125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0125"
    },
    {
      "name": "CVE-2021-33096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
    },
    {
      "name": "CVE-2021-33114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
    },
    {
      "name": "CVE-2021-0091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0091"
    },
    {
      "name": "CVE-2022-21205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21205"
    },
    {
      "name": "CVE-2021-33113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
    },
    {
      "name": "CVE-2021-0156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0156"
    },
    {
      "name": "CVE-2021-0161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
    },
    {
      "name": "CVE-2022-21204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21204"
    },
    {
      "name": "CVE-2021-33147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33147"
    },
    {
      "name": "CVE-2021-0107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0107"
    },
    {
      "name": "CVE-2021-0072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
    },
    {
      "name": "CVE-2021-0124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0124"
    },
    {
      "name": "CVE-2021-0169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0169"
    },
    {
      "name": "CVE-2021-33110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
    },
    {
      "name": "CVE-2021-33129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33129"
    },
    {
      "name": "CVE-2021-0168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
    },
    {
      "name": "CVE-2021-0093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0093"
    },
    {
      "name": "CVE-2022-21174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21174"
    },
    {
      "name": "CVE-2021-33137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33137"
    },
    {
      "name": "CVE-2021-33115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
    },
    {
      "name": "CVE-2021-0144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0144"
    },
    {
      "name": "CVE-2022-21226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21226"
    },
    {
      "name": "CVE-2021-0117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0117"
    },
    {
      "name": "CVE-2021-0103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0103"
    },
    {
      "name": "CVE-2021-0116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0116"
    },
    {
      "name": "CVE-2021-0179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0179"
    },
    {
      "name": "CVE-2021-0164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
    },
    {
      "name": "CVE-2021-33061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
    },
    {
      "name": "CVE-2021-0172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
    },
    {
      "name": "CVE-2021-0092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0092"
    },
    {
      "name": "CVE-2021-0115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0115"
    },
    {
      "name": "CVE-2021-0099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0099"
    },
    {
      "name": "CVE-2021-33166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33166"
    },
    {
      "name": "CVE-2021-0066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
    },
    {
      "name": "CVE-2021-44454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44454"
    },
    {
      "name": "CVE-2021-0060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0060"
    },
    {
      "name": "CVE-2021-33119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33119"
    },
    {
      "name": "CVE-2021-0147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0147"
    },
    {
      "name": "CVE-2021-33139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
    },
    {
      "name": "CVE-2021-0127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0127"
    },
    {
      "name": "CVE-2021-33155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
    },
    {
      "name": "CVE-2021-0163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0163"
    },
    {
      "name": "CVE-2021-0170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
    },
    {
      "name": "CVE-2021-33101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33101"
    },
    {
      "name": "CVE-2021-0173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
    },
    {
      "name": "CVE-2021-33107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33107"
    },
    {
      "name": "CVE-2021-0174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
    },
    {
      "name": "CVE-2021-0162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0162"
    },
    {
      "name": "CVE-2022-21157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21157"
    },
    {
      "name": "CVE-2021-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0167"
    },
    {
      "name": "CVE-2021-0183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
    },
    {
      "name": "CVE-2022-21153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21153"
    },
    {
      "name": "CVE-2021-0118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0118"
    },
    {
      "name": "CVE-2021-0178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0178"
    },
    {
      "name": "CVE-2021-0145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0145"
    },
    {
      "name": "CVE-2021-0165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
    },
    {
      "name": "CVE-2021-0166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
    },
    {
      "name": "CVE-2021-0111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0111"
    },
    {
      "name": "CVE-2022-21220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21220"
    },
    {
      "name": "CVE-2021-33068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33068"
    },
    {
      "name": "CVE-2021-0171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0171"
    },
    {
      "name": "CVE-2021-0176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
    },
    {
      "name": "CVE-2022-21156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21156"
    },
    {
      "name": "CVE-2021-33120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33120"
    },
    {
      "name": "CVE-2021-0177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0177"
    },
    {
      "name": "CVE-2022-21203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21203"
    },
    {
      "name": "CVE-2021-0114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0114"
    },
    {
      "name": "CVE-2021-0175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
    },
    {
      "name": "CVE-2021-23152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23152"
    }
  ],
  "initial_release_date": "2022-02-09T00:00:00",
  "last_revision_date": "2022-02-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-127",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-02-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00589 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00607 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00607.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00581 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00527 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00591 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00591.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00539 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00532 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00639 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00639.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00582 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00588 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00588.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00594 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00594.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00470 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00561 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00622 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00575 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00632 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00599 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00599.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00574 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00574.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00571 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00604 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00608 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00608.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00600 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html"
    }
  ]
}
  WID-SEC-W-2022-0391
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.\r\nProLiant ist eine Serverfamilie von Hewlett Packard Enterprise.\r\nSynergy ist eine kombinierbare Blade-Infrastruktur, die Workloads in einer Hybrid Cloud-Umgebung unterst\u00fctzt.\r\nLenovo ist ein Hersteller u. a. von Computern.\r\nDas BIOS ist die Firmware bei IBM PC kompatiblen Computern.\r\nCitrix Hypervisor ist eine Plattform f\u00fcr Desktop-, Server- und Cloud-Virtualisierungsinfrastrukturen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und vertrauliche Informationen offenzulegen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- NetApp Appliance\n- BIOS/Firmware\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0391 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0391.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0391 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0391"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory vom 2022-02-08",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-77639"
      },
      {
        "category": "external",
        "summary": "Citrix Security Advisory vom 2022-02-08",
        "url": "https://support.citrix.com/article/CTX337526"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2022-02-08",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2022-02-08",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2022-02-08",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Advisory vom 2022-02-08",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04244en_us"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20220210-0008 vom 2022-02-14",
        "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0502-1 vom 2022-02-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0541-1 vom 2022-02-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0575-1 vom 2022-02-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0574-1 vom 2022-02-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0576-1 vom 2022-02-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04244en_us"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1762 vom 2022-03-09",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1762.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5486-1 vom 2022-06-20",
        "url": "https://ubuntu.com/security/notices/USN-5486-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5535-1 vom 2022-07-28",
        "url": "https://ubuntu.com/security/notices/USN-5535-1"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6845359 vom 2022-12-06",
        "url": "https://www.ibm.com/support/pages/node/6845359"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202402-22 vom 2024-02-19",
        "url": "https://security.gentoo.org/glsa/202402-22"
      }
    ],
    "source_lang": "en-US",
    "title": "Intel Prozessoren: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-02-18T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:28:51.363+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0391",
      "initial_release_date": "2022-02-08T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-02-08T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-02-13T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2022-02-20T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-21T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-27T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-03-06T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2022-03-08T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-19T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-07-28T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-12-05T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-02-18T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Gentoo aufgenommen"
        }
      ],
      "status": "final",
      "version": "11"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Citrix Systems Hypervisor",
            "product": {
              "name": "Citrix Systems Hypervisor",
              "product_id": "T016872",
              "product_identification_helper": {
                "cpe": "cpe:/o:citrix:hypervisor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Citrix Systems"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE ProLiant",
            "product": {
              "name": "HPE ProLiant",
              "product_id": "T009310",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:proliant:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "HPE Synergy",
            "product": {
              "name": "HPE Synergy",
              "product_id": "T019820",
              "product_identification_helper": {
                "cpe": "cpe:/h:hpe:synergy:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM QRadar SIEM",
            "product": {
              "name": "IBM QRadar SIEM",
              "product_id": "T021415",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:qradar_siem:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel Prozessor",
            "product": {
              "name": "Intel Prozessor",
              "product_id": "T011586",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:intel_prozessor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Lenovo BIOS",
            "product": {
              "name": "Lenovo BIOS",
              "product_id": "T005651",
              "product_identification_helper": {
                "cpe": "cpe:/h:lenovo:bios:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Lenovo Computer",
            "product": {
              "name": "Lenovo Computer",
              "product_id": "T006520",
              "product_identification_helper": {
                "cpe": "cpe:/o:lenovo:lenovo_computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Lenovo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp Data ONTAP",
            "product": {
              "name": "NetApp Data ONTAP",
              "product_id": "7654",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:data_ontap:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgem\u00e4\u00dfen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs au\u00dferhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T005651",
          "T006520",
          "T019820",
          "T002207",
          "T000126",
          "T021415",
          "7654",
          "T011586",
          "398363",
          "T012167",
          "T016872",
          "T009310"
        ]
      },
      "release_date": "2022-02-08T23:00:00.000+00:00",
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgem\u00e4\u00dfen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs au\u00dferhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T005651",
          "T006520",
          "T019820",
          "T002207",
          "T000126",
          "T021415",
          "7654",
          "T011586",
          "398363",
          "T012167",
          "T016872",
          "T009310"
        ]
      },
      "release_date": "2022-02-08T23:00:00.000+00:00",
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-33120",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgem\u00e4\u00dfen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs au\u00dferhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T005651",
          "T006520",
          "T019820",
          "T002207",
          "T000126",
          "T021415",
          "7654",
          "T011586",
          "398363",
          "T012167",
          "T016872",
          "T009310"
        ]
      },
      "release_date": "2022-02-08T23:00:00.000+00:00",
      "title": "CVE-2021-33120"
    }
  ]
}
  wid-sec-w-2022-0391
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.\r\nProLiant ist eine Serverfamilie von Hewlett Packard Enterprise.\r\nSynergy ist eine kombinierbare Blade-Infrastruktur, die Workloads in einer Hybrid Cloud-Umgebung unterst\u00fctzt.\r\nLenovo ist ein Hersteller u. a. von Computern.\r\nDas BIOS ist die Firmware bei IBM PC kompatiblen Computern.\r\nCitrix Hypervisor ist eine Plattform f\u00fcr Desktop-, Server- und Cloud-Virtualisierungsinfrastrukturen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und vertrauliche Informationen offenzulegen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- NetApp Appliance\n- BIOS/Firmware\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0391 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0391.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0391 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0391"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory vom 2022-02-08",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-77639"
      },
      {
        "category": "external",
        "summary": "Citrix Security Advisory vom 2022-02-08",
        "url": "https://support.citrix.com/article/CTX337526"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2022-02-08",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2022-02-08",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory vom 2022-02-08",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Advisory vom 2022-02-08",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04244en_us"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20220210-0008 vom 2022-02-14",
        "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0502-1 vom 2022-02-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0541-1 vom 2022-02-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0575-1 vom 2022-02-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0574-1 vom 2022-02-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:0576-1 vom 2022-02-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04244en_us"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1762 vom 2022-03-09",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1762.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5486-1 vom 2022-06-20",
        "url": "https://ubuntu.com/security/notices/USN-5486-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5535-1 vom 2022-07-28",
        "url": "https://ubuntu.com/security/notices/USN-5535-1"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6845359 vom 2022-12-06",
        "url": "https://www.ibm.com/support/pages/node/6845359"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202402-22 vom 2024-02-19",
        "url": "https://security.gentoo.org/glsa/202402-22"
      }
    ],
    "source_lang": "en-US",
    "title": "Intel Prozessoren: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-02-18T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:28:51.363+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0391",
      "initial_release_date": "2022-02-08T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-02-08T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-02-13T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2022-02-20T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-21T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-02-27T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-03-06T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2022-03-08T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-06-19T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-07-28T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-12-05T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-02-18T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Gentoo aufgenommen"
        }
      ],
      "status": "final",
      "version": "11"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Citrix Systems Hypervisor",
            "product": {
              "name": "Citrix Systems Hypervisor",
              "product_id": "T016872",
              "product_identification_helper": {
                "cpe": "cpe:/o:citrix:hypervisor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Citrix Systems"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE ProLiant",
            "product": {
              "name": "HPE ProLiant",
              "product_id": "T009310",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:proliant:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "HPE Synergy",
            "product": {
              "name": "HPE Synergy",
              "product_id": "T019820",
              "product_identification_helper": {
                "cpe": "cpe:/h:hpe:synergy:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM QRadar SIEM",
            "product": {
              "name": "IBM QRadar SIEM",
              "product_id": "T021415",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:qradar_siem:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel Prozessor",
            "product": {
              "name": "Intel Prozessor",
              "product_id": "T011586",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:intel_prozessor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Lenovo BIOS",
            "product": {
              "name": "Lenovo BIOS",
              "product_id": "T005651",
              "product_identification_helper": {
                "cpe": "cpe:/h:lenovo:bios:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Lenovo Computer",
            "product": {
              "name": "Lenovo Computer",
              "product_id": "T006520",
              "product_identification_helper": {
                "cpe": "cpe:/o:lenovo:lenovo_computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Lenovo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp Data ONTAP",
            "product": {
              "name": "NetApp Data ONTAP",
              "product_id": "7654",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:data_ontap:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-0127",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgem\u00e4\u00dfen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs au\u00dferhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T005651",
          "T006520",
          "T019820",
          "T002207",
          "T000126",
          "T021415",
          "7654",
          "T011586",
          "398363",
          "T012167",
          "T016872",
          "T009310"
        ]
      },
      "release_date": "2022-02-08T23:00:00.000+00:00",
      "title": "CVE-2021-0127"
    },
    {
      "cve": "CVE-2021-0145",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgem\u00e4\u00dfen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs au\u00dferhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T005651",
          "T006520",
          "T019820",
          "T002207",
          "T000126",
          "T021415",
          "7654",
          "T011586",
          "398363",
          "T012167",
          "T016872",
          "T009310"
        ]
      },
      "release_date": "2022-02-08T23:00:00.000+00:00",
      "title": "CVE-2021-0145"
    },
    {
      "cve": "CVE-2021-33120",
      "notes": [
        {
          "category": "description",
          "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unzureichenden Steuerungsflussverwaltung, einer unsachgem\u00e4\u00dfen Initialisierung gemeinsam genutzter Ressourcen und eines Lesevorgangs au\u00dferhalb der Grenzen unter komplexen mikroarchitektonischen Bedingungen im Speichersubsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T005651",
          "T006520",
          "T019820",
          "T002207",
          "T000126",
          "T021415",
          "7654",
          "T011586",
          "398363",
          "T012167",
          "T016872",
          "T009310"
        ]
      },
      "release_date": "2022-02-08T23:00:00.000+00:00",
      "title": "CVE-2021-33120"
    }
  ]
}
  gsd-2021-0127
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2021-0127",
    "description": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
    "id": "GSD-2021-0127",
    "references": [
      "https://www.suse.com/security/cve/CVE-2021-0127.html",
      "https://advisories.mageia.org/CVE-2021-0127.html",
      "https://ubuntu.com/security/CVE-2021-0127"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-0127"
      ],
      "details": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.",
      "id": "GSD-2021-0127",
      "modified": "2023-12-13T01:23:07.455835Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secure@intel.com",
        "ID": "CVE-2021-0127",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Intel(R) Processors",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "See references"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "denial of service"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html",
            "refsource": "MISC",
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20220210-0008/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0127"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-noinfo"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html",
              "refsource": "MISC",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20220210-0008/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20220210-0008/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "LOW",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2022-02-15T21:12Z",
      "publishedDate": "2022-02-09T23:15Z"
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.