Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-39298
Vulnerability from cvelistv5
Published
2022-02-16 16:38
Modified
2024-08-04 02:06
Severity ?
EPSS score ?
Summary
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: Various |
|||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:06:42.610Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "AGESA", platforms: [ "x86", ], product: "2nd Gen EPYC", vendor: "AMD", versions: [ { status: "affected", version: "Various ", }, ], }, { defaultStatus: "unaffected", packageName: "AGESA", platforms: [ "x86", ], product: "3rd Gen EPYC", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen 2000 Series", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen 3000 Series ", vendor: "AMD", versions: [ { status: "affected", version: "Various ", }, ], }, { defaultStatus: "unaffected", packageName: "AGESA", platforms: [ "x86", ], product: "Ryzen 5000 Series ", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-01-10T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.<br><br>", }, ], value: "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-01-11T07:01:59.843980Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, { url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", }, ], source: { advisory: "AMD-SB-1032", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-39298", datePublished: "2022-02-16T16:38:10.726517Z", dateReserved: "2021-08-19T00:00:00", dateUpdated: "2024-08-04T02:06:42.610Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-39298\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2022-02-16T17:15:10.860\",\"lastModified\":\"2024-11-21T06:19:09.240\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una potencial vulnerabilidad en el manejador de interrupciones del Modo de Gestión del Sistema (SMM) de AMD puede permitir a un atacante con altos privilegios acceder al SMM resultando en la ejecución de código arbitrario que podría ser utilizado por actores maliciosos para eludir los mecanismos de seguridad proporcionados en el firmware UEFI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.12.00\",\"matchCriteriaId\":\"6E3D0268-99F9-470C-A2C1-C8667BCE3828\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EB5330-7C9B-4CE4-AF6B-18D0ED8D2D1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.10.00\",\"matchCriteriaId\":\"85837EF3-C3E4-4BFA-8416-2D237A6177C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D9DCC9-8EB2-481E-BBAF-DD738E83AC25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.07.00\",\"matchCriteriaId\":\"7C872354-7197-465A-B691-3BD20A229CA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A41ADB-202C-46AD-AFBA-6F060FA3502F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(core-x\\\\)_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"DC137328-5573-4781-8DA2-B135CD44533A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(core-x\\\\)_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"6E2C4D23-D2FA-4C89-B4C2-C775A17A21C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(core-x\\\\)_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"ADA3082C-BC33-4464-8FC3-F45A859A2DB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4_g4_workstation_\\\\(core-x\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEAD0B9A-B36F-4C48-AFBB-D71192899993\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(xeon_w\\\\)_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"D9B59BE0-2D53-4D59-846B-80F47B7B836E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(xeon_w\\\\)_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"88774B45-D51B-4971-9FD0-AA15523F3788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(xeon_w\\\\)_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"FF6DFFBF-C17E-4FF7-B4A9-693D42A1C42B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4_g4_workstation_\\\\(xeon_w\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EBF60B-E2A4-492B-A58F-2A01B77AE74A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"83CC465C-DFFD-4C9C-881C-97B59410EC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"790D9AFB-2AFC-4635-A556-3C91403FE6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"77E66B91-184D-49B5-9685-96995F2B1C07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD26B60-086E-4C83-B3EB-CA4981AAAF7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"EA52B0BD-5AF3-4079-B25B-993CA85CB115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"6D033ECD-5E03-4A57-AA34-BA92A6525865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"BAFCE15A-5D6A-4AB1-AC68-4AB1E0E55EFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"068354B9-5842-4014-A466-011FA1AA62B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.10.00\",\"matchCriteriaId\":\"CB0213EB-A71F-4CB0-8D14-4A0C7008B59C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8187C850-4BB8-474A-B5D2-09560AAF47D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.18.00\",\"matchCriteriaId\":\"B0C3ABB0-30EE-402A-A655-EF1AB8CFDEE4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B81932E-C047-45A8-80DD-32E19351D675\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"D4FCCC71-FA95-43DD-9874-FC873252B614\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A1751-0FD4-4FA7-8681-CC82C4D47BFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"83CE6347-D6CF-421E-A8B4-D087E4C242F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28829816-379A-43CA-B2B0-2DDC32C9EFA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"3AC42EBC-B581-4102-B614-C8DDB37A5ED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"301EE3DA-31B5-44E3-B6B7-1E3A87B24F65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"A5199F27-D189-4663-AC00-7C63A4BD9900\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E086097A-D53C-4AD2-891E-FEF5EE21B6AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"DD025A26-8ED9-4A81-AE2D-DFEDBAE336D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72682A82-B694-4CE0-9B88-DCAAC8A6C8B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"7FC3266B-99F0-4F25-B923-154522B8833B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C181FFEA-FF8C-4FFF-AB13-6F660FD54737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"7D6965EE-5FA5-4DD5-B1B7-339181E90A00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F4E2D01-4CC3-4FBB-8B49-0C087DC580FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"E8AD6BBB-F010-4A24-A958-FD91303C46FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8BCBD1-AB54-4160-9FEC-426B3905A56A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"4582CD80-9128-41C3-8F11-268B3C484E97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8707F9-46CB-48F7-8CFA-EE90F44D5585\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"7036932C-2519-4415-B770-65F9E87B4C8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127371E2-74C1-41E8-8D0C-8551E4B6A656\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"BA6A472F-0B69-46EC-A8B7-E6D35BB54EA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D306687B-3EF9-40B4-88E1-F9840FBF332C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"31B20FC9-4E17-49A9-9ADB-51023CA8DE4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30065E2-A918-499B-864F-50C12E7699EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"F815D088-2416-4DDB-BE7A-8DEF2C79266B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663E72B3-5986-434C-B395-43CF1A461A55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"A01005B3-2613-4991-9D13-186E5EE129AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5446ABE-8540-4DF0-A3EA-BEE74199856C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"A0890E78-D869-45C4-8FE9-023B7392230B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FA123E-719F-465F-A89C-D15E79360A96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"E5EB5590-0502-4DD2-82EE-B0E996BA7853\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DA2D2-F41F-4569-A58D-A38C6B9AC01B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"A8449A10-2386-4BC9-B6A7-4D7B724D5E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5091726-485B-4F0D-A451-8FA3FF10B952\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"0B353663-91A0-49C5-BF31-F066635D77AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02654E2D-30A7-4A07-AD0A-10402AD2CD7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"1CC73DD1-8996-4A07-BB7F-3CAD5B8DF839\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A024B6E-6F91-47AB-B29D-659A7F2A0595\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"24DE0204-652E-4E87-A605-68C2EDFAAFBE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A27335B7-81BA-4A1D-922B-CE34EBD31A60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"71359566-0D9E-4558-BCC6-AAB4A37CF793\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFF12568-610A-40BA-A29D-946298512F74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"650BE1D6-4959-4B52-B764-48A480E88F4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BBE35C-34BF-49B0-9501-7A6ABE8799E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"D663A797-6C56-497F-BF1C-506D22F05F00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2EB22C-6899-4C3B-BA7D-882351D6FC2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"0BBD65A6-642F-47F1-B6B2-9EE97A9DEC2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC02312C-289C-445B-8FC6-D5854EA44F87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"DBBAD7A6-FF7C-4667-B9F2-1E8A9BF14590\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F752EC-E05D-416D-99D3-7DEFDA160755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"C66FCA12-6232-45AF-8545-6308EE5DA86F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCEF5B4C-DB2B-4406-8EE1-7E5A63E89045\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"586AC3DA-3CF3-4746-80B6-13459109A4DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A72152-CDBC-4709-B484-9259E9EAB82D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"3FFAF331-B433-4672-AF2F-4CEFC9CE1251\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"201BF348-CDDE-4ED8-9339-0830AEE5B208\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"B652E6FF-4AF9-4CD2-BA26-D71DE4FC4721\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DFE16C-A6BC-485F-A77F-A892889BBB64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"40E842B2-E3FB-43DA-9BD3-18D77258C6BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C27ABA-63FC-4DCE-925A-1C8A3D5D73F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"A6721D77-E09B-4F2F-BA6F-CB3265010486\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B86EC79-4160-4118-8D0B-4CBA069976E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"F0CD1A70-9F2E-4B9D-A2C7-B280C0B9642A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"485F527D-CED9-4865-BF19-0E474ED5C177\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"91A0AF80-8759-41C5-B0F2-370B96647271\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E98FB1B-AC60-4432-B67A-926DF0F7AFD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"A0EC0782-B8AF-4B2B-B8F5-BBBA95CEB010\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3FE302-C270-4C5E-B8AF-A140843E7E3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"43CD2A63-737A-4D74-BFE7-4FDDD21968E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C439DA-9B30-47B3-843C-B3A220A5159D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"BD3E5AE3-EF42-420C-A29F-9F5F06B7B974\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"707ACE08-2017-4A78-837F-BEBC02929E99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"00A1EFA0-07AB-430D-B9ED-7F6F84EDDE67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDDE2542-2C2F-4295-91A1-F09E308C5B5F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"CDE0DC18-44CA-4191-A787-555C773DAFAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B40BA1-1F6C-4786-9F33-52EEF0ADE083\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"7BD781FA-CF82-49DF-AD6A-C54B5659259F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE8B02E-2DBD-4E4D-9B8B-E6E916709327\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"7B5C798F-9C96-4C99-9F70-026F3B3657B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14F18988-4CB2-43D3-ACC5-882695D713D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"7E1D6CC1-C0CD-472F-8C9E-00F27B4C8B5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C64369-5FDB-4584-AAB6-C87B95DA5FB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"54AB35E4-8827-4848-853D-B392C7C88F27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"986AAA40-9DC9-4D20-A4DA-2D02636C1A62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"5FD1C410-2224-4272-B178-562E5AE9A94B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD00A6D-426F-4470-A07C-A9E319A813B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"F243AEAD-C4FD-4F39-8D55-CE26F364BF3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C45C4B7-1E60-40C3-AE9B-1928CFDD15BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"F188BF61-13A7-4994-ABAC-3BA8DF74FD0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28CBAEA-21E2-4FB5-A3DF-B20145F63322\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"467B4707-142A-4A2A-851E-06D1C46791ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F93D1E8-C7A7-4B35-9389-AAC3DD0FA978\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"9D190CAC-76EA-4436-8254-9DED818C4512\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7910C11F-B709-45DC-B4EB-92B7A2001E13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"3C7D1DD2-CFBB-4E3E-8B48-214B014A13F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92A898F-BBDC-48B8-9159-8E0CD67AD6ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"FE3751D6-2B81-41FF-A8E7-D4BD7AD4B87D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A4B95B-48FA-493B-986C-F4E0C5E20183\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"6BA2A031-1AEB-4B3A-A173-BACF3EBFFA09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1982269-50DD-4939-8158-4B7357D7AEE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"6E5E3301-3D69-4380-B96F-1F3E0FC5C375\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9871C2-D63F-4623-B8E0-1356A48554FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"5A52563B-DFAD-4F28-A939-1A2AE28983AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80EF159A-302D-4F73-8A08-683805B051A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"3DC2695D-8CDE-4208-8A16-E8F7F5151A9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E458FE6-3295-4982-BCCD-8BF1BDBCA8B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"126B6E1B-5CBD-4B22-9885-C86B9C3D5737\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"657F2CA6-D464-466F-BB6F-11316D3E27DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"04DBCD9D-54E4-47C3-8155-7367D9E43BFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D01A2D5C-89B8-4609-909C-245DF7A15912\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"2F7BE714-F56C-4EEE-9FC0-543FF17AF860\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6351F53-2458-47FB-B547-C56691B7CF50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"FD13471F-E05D-4ECB-BCA4-AA34B495B1AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"389760F8-5B6B-40DD-9F8D-A542CABBD4FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"8AFD1502-C6CE-4971-8ADB-5A4DC2F8B4B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F15254-6AF1-4495-B89F-F58084D11D36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"49971E3F-92A1-4A9F-91FF-91DEBF6E8BB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3AE72B1-6CEF-4F42-8196-8B260F3ED219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"738DA3C3-B7C4-4537-99B5-F4A2EDB478AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED793F1B-C4A0-41B7-856B-20CF33308750\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.18.00\",\"matchCriteriaId\":\"769A944E-5259-4B7C-AC91-76497981621E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC67078-7715-4A45-A1B4-89D2B7196AE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.13.00\",\"matchCriteriaId\":\"1B911F5A-1032-4AD2-AB5F-19DC2BAD892A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE118D9C-6CCF-4063-891C-A87E5CEAA181\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.09.00\",\"matchCriteriaId\":\"28FFF7D0-03C4-4B20-9666-A58B8A1CF6C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151C6B17-477C-44F7-8701-DA9E35981379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.09.00\",\"matchCriteriaId\":\"81BF086A-9043-4279-B0BB-C28E5266CF8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3688601-B128-4BEA-980D-DC3325343662\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"479DA25B-CBBA-4735-8366-19C97F2E1114\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A3E458-BE55-437B-9303-CCAE23C40ACE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"31412E71-045E-4B40-8F28-CDC0873104A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7532BAA7-ABDC-4283-91AC-56A30994F0BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"4BFA7B22-C27D-4948-B262-711961B578CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF860CD-924C-4A15-AD82-FDBCF7C13F43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"FF4C9066-374E-4E80-B869-C1434780D6F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"740E81D7-398A-4DDE-92A7-B89BABCEB4FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"135441B1-A6F3-40F1-A130-91F1EC8FA1DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B95D51-A675-4995-9F43-0C53CC7C9035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"8728F160-4B47-42BB-9346-0683B67AD29A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC561D0-0216-4517-A551-166557FC5D1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"FD4767AF-B638-4DCF-91FB-D13DA49BCB37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2F25C8-CCFC-47BA-B7F9-A86478245203\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"19DCA0C1-E526-4DF3-8599-B59219589FF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2EFA3E-8FDC-435B-AED8-4146826934E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"ED250C9F-E60F-4E78-81F2-7EACCD5FB58C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17DC385C-6789-4F1C-9280-9E5C7DE8EA11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"A2385933-DF9C-47A8-8565-D8EAF3549FA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27439B52-B175-4D6F-8AE0-2D8648789D4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"04A693EA-9603-4D91-AA9F-BE4A3AC86B38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F61956A9-8CFB-4B96-B068-878E0CFF13BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"020F41F8-69D4-4118-8CA0-E3752FFC60E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8669346-38FA-44C5-A712-2C0FCCFDD44E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"726C41E6-F299-4026-BADD-BC37D026E0D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381B4451-AB62-444A-B34A-108EF21D84D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"3F364173-9EDE-4C39-BABB-9F3538035B53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A7FB8-9EB1-46DE-9AD7-07D4DC2A7E06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"640C9068-7E29-4BC2-9C59-DBD405A7A368\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADBEE86-6EB5-4892-BAFE-AD37FFD13849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"D964C206-5B2B-45F3-BAD2-489572A792F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC03BC1C-7FC2-4EC7-A806-8717413B1AED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"C77CD9B3-A3D1-4FA6-9E40-C14A6F79AB82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168E3BC4-9ED6-4863-B6E8-458EEF9E7339\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"15F9EE0F-A8A6-4888-98F5-4AF74425AD31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7ECCEB4-60B6-454D-96F1-1CAAEA7CD223\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"7A0E656A-7904-4A2A-987D-53B9FD38D2E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BAA40E-D254-463B-976F-A75898E20E67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"4840180D-E1E1-4550-985E-42AC49384E82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2312856-3674-475E-8450-4D10D9A5A9DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"94DDD00B-487D-4839-BEB5-8748AD772C51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5BA7CE-6BF2-408F-8B50-07B897342E52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"9B376E11-11D9-46D6-ABA0-FF1EA0645DEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FB7C62-AD79-4F7A-8AA4-27B744B5F26C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"DB6FD126-4865-4855-9A4E-BD08FFFA66C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D3558A-C998-40B9-9E52-5F581B74A3F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"271CCD58-E2D1-48B4-9871-1C6A5F1B25AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E44F4E-85E6-471A-A85D-4D7B09B69F0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"B0202EB4-0693-43ED-B1C6-7B028701A957\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA80A29-3C98-4767-B784-F2A13097741E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"3C4B45DC-DA76-48A6-8D98-D522128EE7FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB9C53B-328F-449C-9137-D20B72031D8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"1224114D-B82D-4A80-91CC-4CC6C29A00C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFA26D63-E18E-4AB8-950D-904CF3D62EB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"85E87ADF-4724-46E0-B67B-0C54649BC659\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA9E826-6EAA-45EE-8613-46EE025ECD65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"D89DF58D-EE3A-41EA-848F-468E07780FF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B9E550-4D16-430D-813E-B425BAFEA4C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"29A11166-864C-42FE-AADA-8B04C274D921\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36603B4C-F5C6-4075-BEB1-90401B5D3A2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"27D066B2-7A97-4948-AC59-430B87E18E92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B4D838-F2FC-4F7B-B606-9F005D125FA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"61429F91-58E2-48EE-9E50-F3B9D1AE2915\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3654A9CC-CBF9-4045-A929-1458A2AE99FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"FADB9E91-4397-40C8-BF24-4BB0683EC8F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5FBB0A-9A79-482F-9E59-2291712BD161\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.17.00\",\"matchCriteriaId\":\"548B6DE2-E251-4D58-81AD-884F4576AE55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7565B63-6B13-4F72-9538-845635B945DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"386FBD67-6C2C-4C60-93E6-0A308E5DDF3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D22A07E-3033-4B61-B366-E09FE72DF08B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"5FA20789-20F8-468C-BA4E-8F6C25A7D5C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB6F5B7-5248-45C8-B83E-5ADD8077E9D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C8675000-C780-4AAC-B110-A62B45878D73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D567DE-9D36-4B40-8847-AAD14E253CAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"E1453A48-B267-4B3C-A0C2-5A39468613DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A503FF-6FAB-4B98-A01C-EEE0880EBCB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DDBB384C-D46F-4018-A5FD-B4E3E7495A02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D53396C-8599-4D9E-9147-2C47945AF38C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DDBB384C-D46F-4018-A5FD-B4E3E7495A02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D53396C-8599-4D9E-9147-2C47945AF38C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"21AE541E-EC44-4A11-B5C1-3735C9EB92E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DE7353B-4944-4703-B17D-FF73328D6B9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"A5252DEB-5D25-420C-956C-0613C6956C04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03790B11-60F3-4467-9159-2C5395235239\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"F4215483-D174-4000-9692-AA4576FBB13A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F8E6C68-1086-4EA8-B8D0-E9EE9B9270F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"7C13165A-DA77-4CAC-B9A6-81559E771AAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA51C81-1D34-4747-A262-B28566BB097E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"01AF91A0-282E-4E3E-96CB-1866CC6F9298\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BF1386-C43B-4B27-BF7C-26D0FAF13B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"1F2F3943-84C1-4C4E-9E90-95BF31C3C561\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2BEB8B-BA79-4B40-8A35-6CD2545E1595\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"AEE243D0-FF62-4409-8EBB-F36B03E39B85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A8DAD6-9F6D-4AC6-976C-3D4EC566A1CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"EE96B118-36B1-47F0-BD79-7442105C6F87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5993123E-068C-498A-B17F-8D9A45BA4510\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"7657C542-ED48-4A86-B9D1-56D1C69EF3C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE2056B-7AFB-40C7-B16D-891EFFD9C29C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"B6A91A8D-F8E6-4575-983D-E7DA65070B18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0679C9-65D0-48D6-A7B2-60B3411AEF84\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"2E3556A6-20CA-4FF7-B79F-B7042B723A45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E433E3CE-8920-4FE2-8C9E-06E02D5EF5B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"A708017F-2D47-4BC3-B558-BE53FE45BF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614C6061-751F-4F8D-BDB0-225B0AD9779A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"35027039-EEC5-453C-B5CA-0E008B8B986C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07D9459-D011-4C13-A406-5DA58AD88080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"73BB2DA7-7D09-4685-B5AC-6E9315E42A65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B881AC-BAA0-495C-B336-050C25A2420B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"3945E498-B34F-491A-B67D-496AC7D24CC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69BF32D7-1115-4971-BE35-2254A6C566F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"D0AFEC77-9B32-4353-B81A-0EED73CA0467\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB467DC-D239-4459-BF9C-041D8EB8F51B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"EF60D396-C1B8-41EB-9560-3BBB9655B33D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA5CE713-B07E-49C8-88CB-B16FA4752B16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"D244F930-2B60-4769-8CD4-9C042038ED7D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C276DE51-141A-49D0-9BE4-9F740D5A2F44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DC8D3CEB-F5AF-4FB2-8E7B-61C1BF11D703\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93B88FF-5E57-4DD9-9568-26306D068230\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"4823EE58-C174-4C60-B0D9-96B682E79EB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AEF73CA-7A05-4650-9081-0A501D09F551\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"841E0FD7-2512-46F2-8DB0-10747FC421B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449CD858-582B-49CA-95CB-AFDD5302ACE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"324459DB-65E9-45EA-9333-95F956CA25BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4CB0D3-2948-4D9B-8C48-CE6E9A8A2FAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"232C50AA-162B-4D0D-B2D9-2E4BD99AEE72\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79906731-74C1-4081-822F-29D0095F038A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"F87CD4E9-0981-49E2-BD14-C71BFC01C121\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6457F0D4-E6C7-414A-AAAD-0F61FFE8BA72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C2BAAFD8-523E-449C-99FE-3E04D27C9DAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4192B127-7DDA-47BA-A441-013061097ED9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"5948DFE1-A3DB-4747-AEC9-1256CAE386AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C30F26F-C63A-4C95-AFAB-7B49B29C667C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"7C192881-CA4D-476A-AB86-6455CAFC797D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66ED0BFA-33B9-4850-A934-DCE0399BBC67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"20AE11EE-CD36-47A4-8245-8AA8DE777EFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E633AD8-5971-4E37-86BD-83B309D1776E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"35F011A8-0688-436A-89B2-E85C149B3549\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC825D4-65D1-40BE-AAFB-9A1D117DE069\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"B1BDA03D-946E-4C24-B699-C1EE5F9B667C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DE92A90-5580-4BF6-B73F-ECEA4693048D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"BEAAB0F3-49B9-4AA8-8D9B-69B2246E3B23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888AC622-8FB4-4D17-846F-1F9CCBB7EBFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"474023E5-9A9D-46A1-B414-A73002CFA76F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24380823-8372-4989-8EB9-46390A258B7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"4FCD473F-0C75-4D81-B086-7AADEADBFCDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"919973B8-DA48-410A-B3D4-43A56E7BE381\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"818F199A-8694-42CE-9EA4-FEC1350EB9AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7970A0E9-64DC-4CA0-A9CA-D06B2BBC42AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"D8C5156B-E69D-4835-8E16-7BAB67AD89DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95BF30A-1785-4DE1-8272-29196C362C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"6DECC12A-E49B-44D8-A04D-F00EC4C2AB7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2CA843-228C-42FE-8236-1C99B30862E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C5B16CEC-8139-4E89-94EA-D5E297CEA431\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D168C72-E7A0-490C-A09C-A075F0C2BFB9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"739D9744-B075-40D0-AE69-90A5F6C5CA13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DDBB3E4-A059-4DE9-B887-EAD8D0E34627\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"6FA0D65A-39F2-4205-A97E-5EED1A18B643\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5627AA12-2392-40E8-8A60-2B7FCA939DD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"2C93C14D-E95D-44B9-B13A-E622D7E11848\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41C8C9E-FCCA-4943-B4AF-7E252175619F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"9E3C53A9-F529-4B69-B83A-9B69160C4888\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87157F17-55C7-4B67-A569-553DED315A2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"CABF07C3-5398-4632-9637-A36FCD1040C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF55615F-4964-4A6A-91E4-1DF00ABA9F98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"D828606A-FE16-4E48-A29E-3FB90BECEA27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089CFE4-9A55-484A-92DD-06ADA6C44792\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"A8AC88BE-779A-45CD-95FF-1CE541158112\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFAC2E25-2018-45F3-AF42-CE770A88384B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"232C554F-C097-4382-80B2-E2D833529142\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D3F8A6-877D-4819-A101-B85498D4AB2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"6B69F84E-FFC4-4CE3-8710-6D75919A2BFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E56B264-71E2-4498-AB2D-F4EF3D1BD146\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"8CFCEF0C-BFA2-48FF-AE4A-43181D71444C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170C9213-D9D3-4528-8FA7-B4731A74CC36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"3FF3CF3A-622E-4C32-AF6F-9D6C89F1B662\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDBB1855-A92B-4514-B0DE-CBD6D425866A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"788D9187-602F-492F-89D1-BA1C15ED8CDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DCF6A1-3209-4743-B1A5-774FE0BF25C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\\\(with_pci_slot\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"71ED3A81-58FF-4457-B995-42FF769F44B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\\\(with_pci_slot\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4AD5C3-C195-43C0-A3BA-890DD752D31D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"A2ECE739-98D4-4C76-A212-80DF4E81B0C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A342E698-B741-4A24-A797-0940C007770F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"F7A380E5-6EC1-426D-ABBD-2E5C0556777B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168198E7-A2E4-4701-9088-1812C481EC44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"BABD24F3-71E3-4B49-82CA-C9961C423C33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886E5433-52EE-4640-BC7D-52B96F1462EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\\\(with_pci_slot\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"AC2B81EB-3D9B-4F12-8B09-D33C029CDDD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\\\(with_pci_slot\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15C647C-9BFF-46AD-86D4-EC298251082E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"43096AA3-F1F0-4DA3-93CD-4C71727E00CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5443815D-8487-423B-90C1-CE2BD0FCA5E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"50165F13-7A1C-4447-A3DB-04B1E95FB002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC90581B-B895-42A7-993C-1EF1F6B6F3B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"0AD72972-49A9-409E-9109-5CB0F03F0C0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907BAC5B-0AC3-42CD-B145-754639D19E1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"1FC526D5-5D25-4C0C-935B-2282B3C162E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E88C11F-4494-4E85-9ABC-9EC2A6000D4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"8D7C1521-68B1-4602-AB5E-A3BB4C8356F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565542BE-1CF9-49B9-AAA3-36ACC2A4542A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\\\(with_pci_slot\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"A2623895-0CD2-475A-B320-B603CF727E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\\\(with_pci_slot\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB4EEC5-121D-4F96-96AF-88B83CD81D70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"07392785-E50B-4CA6-B835-0FB15D0006A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DB0F11-8DCE-4107-9F44-84719BCA0813\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C1131C8E-63D8-49E8-BDBE-27AF01FCC23B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45AB7CC1-0758-4734-9B6A-7F8CF6107F6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DCA47E40-DF50-44E6-A262-6C73497CCE25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68F00E1A-4DE9-4279-8C8B-3B6950B94354\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"477C1943-D5CC-4780-9EBA-641DB2B441A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E759D0-5DD6-4FD2-A19B-AEC9EF794B49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"39D34B53-DBEB-4CF6-8B00-AFDA9A64B0EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941BB9E1-9900-4258-A05F-31844B581A5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"6B11A0FB-F222-40E9-A70D-07E969B643A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9133486D-201B-4655-85E7-983B22408635\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"4C1353CD-E387-49CB-817D-FBBDC08DA499\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82E6B60-301C-4290-88ED-6A2A28CA1CD6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"53F529E6-0D01-4351-ACB8-77C0EF338F90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BEBA6E6-15F0-48B8-B7D8-12FE12FECFDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"53785B1C-A705-4D8F-BC2C-7F16C6E12303\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FEAE60-B7F7-4866-A8B4-4C750EFEE8A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"2770447B-C933-4384-9E62-2533EFECC33B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A01F60F-D076-4598-8119-679C9DE32E39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"FA937A69-FF57-475A-8652-36D25E1E234D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB542C59-F3B5-42B8-892C-8FCAAEFF81E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"70DC685B-8778-4D10-BE55-178A179299EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55C0EC8-3FAD-45FA-9729-2C04BC14794A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"6981E279-E529-432F-9BD6-E132571FC685\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800F6A3F-3190-4386-B3DD-D2B3F4F0E995\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"8ACF8FA2-2D5C-458D-8C31-FFFF98226677\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0E53DC-2F0E-49C4-98BE-1657B65D5F2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"0B952BD6-48F0-4890-8897-1738526A9792\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88559CE1-5B30-42AE-B136-89C11A0D36C6\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
gsd-2021-39298
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-39298", description: "Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.", id: "GSD-2021-39298", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-39298", ], details: "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.", id: "GSD-2021-39298", modified: "2023-12-13T01:23:15.918290Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "psirt@amd.com", ID: "CVE-2021-39298", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "2nd Gen EPYC", version: { version_data: [ { version_affected: "=", version_value: "Various ", }, ], }, }, { product_name: "3rd Gen EPYC", version: { version_data: [ { version_affected: "=", version_value: "various ", }, ], }, }, { product_name: "Ryzen 2000 Series", version: { version_data: [ { version_affected: "=", version_value: "various ", }, ], }, }, { product_name: "Ryzen 3000 Series ", version: { version_data: [ { version_affected: "=", version_value: "Various ", }, ], }, }, { product_name: "Ryzen 5000 Series ", version: { version_data: [ { version_affected: "=", version_value: "various ", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.", }, ], }, generator: { engine: "Vulnogram 0.1.0-dev", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, { name: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", }, ], }, source: { advisory: "AMD-SB-1032", discovery: "UNKNOWN", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "02.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "02.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "02.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:linux_kernel:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_7:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_10:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z4_g4_workstation_\\(core-x\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:linux_kernel:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_7:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_10:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z4_g4_workstation_\\(xeon_w\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", cpe_name: [], versionEndExcluding: "02.75", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "02.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "02.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.02", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.02", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.02", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.01", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.01", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.01", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.13.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.09.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.09.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.01", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.01", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.08.02", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.19.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "01.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.17.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.03.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.03.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.07.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.03.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.03.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.18.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.12.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.10.00", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "hp-security-alert@hp.com", ID: "CVE-2021-39298", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", refsource: "MISC", tags: [], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, { name: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", refsource: "MISC", tags: [], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2, impactScore: 6, }, }, lastModifiedDate: "2023-01-11T08:15Z", publishedDate: "2022-02-16T17:15Z", }, }, }
WID-SEC-W-2022-0073
Vulnerability from csaf_certbund
Published
2022-05-10 22:00
Modified
2024-02-13 23:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Prozessoren sind die zentralen Rechenwerke eines Computers.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0073 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json", }, { category: "self", summary: "WID-SEC-2022-0073 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073", }, { category: "external", summary: "AMD Security Advisory vom 2022-05-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { category: "external", summary: "AMD Security Advisory vom 2022-05-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", }, { category: "external", summary: "Lenovo Security Advisory vom 2022-05-10", url: "https://support.lenovo.com/us/en/product_security/LEN-87863", }, { category: "external", summary: "HP Security Bulletin HPSBHF03792 vom 2022-05-12", url: "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792", }, { category: "external", summary: "HPE Security Bulletin HPESBHF04235 vom 2022-05-17", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us&hprpt_id=ALERT_HPE_3023598&jumpid=em_pom8nu6hj_aid-520066529", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07", url: "https://alas.aws.amazon.com/ALAS-2022-1606.html", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404", }, { category: "external", summary: "AMD Security Bulletin", url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html", }, ], source_lang: "en-US", title: "AMD Prozessoren: Mehrere Schwachstellen", tracking: { current_release_date: "2024-02-13T23:00:00.000+00:00", generator: { date: "2024-08-15T17:26:24.486+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0073", initial_release_date: "2022-05-10T22:00:00.000+00:00", revision_history: [ { date: "2022-05-10T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-05-12T22:00:00.000+00:00", number: "2", summary: "Neue Updates von HP aufgenommen", }, { date: "2022-05-17T22:00:00.000+00:00", number: "3", summary: "Neue Updates von HPE aufgenommen", }, { date: "2022-05-19T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon und SUSE aufgenommen", }, { date: "2022-05-26T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-02T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-07T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-07T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-01-22T23:00:00.000+00:00", number: "9", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-04-02T22:00:00.000+00:00", number: "10", summary: "CVE's ergänzt", }, { date: "2024-02-13T23:00:00.000+00:00", number: "11", summary: "Neue Updates von AMD aufgenommen", }, ], status: "final", version: "11", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Epyc", product: { name: "AMD Prozessor Epyc", product_id: "T020995", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:epyc", }, }, }, { category: "product_version", name: "Ryzen", product: { name: "AMD Prozessor Ryzen", product_id: "T023180", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:ryzen", }, }, }, { category: "product_version", name: "Athlon", product: { name: "AMD Prozessor Athlon", product_id: "T023181", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:athlon", }, }, }, { category: "product_name", name: "AMD Prozessor", product: { name: "AMD Prozessor", product_id: "T029010", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:-", }, }, }, ], category: "product_name", name: "Prozessor", }, ], category: "vendor", name: "AMD", }, { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "HP Computer", product: { name: "HP Computer", product_id: "T023191", product_identification_helper: { cpe: "cpe:/h:hp:computer:-", }, }, }, ], category: "vendor", name: "HP", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "Lenovo Computer", product: { name: "Lenovo Computer", product_id: "T006520", product_identification_helper: { cpe: "cpe:/o:lenovo:lenovo_computer:-", }, }, }, ], category: "vendor", name: "Lenovo", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20559", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2023-20559", }, { cve: "CVE-2023-20558", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2023-20558", }, { cve: "CVE-2022-21151", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-21151", }, { cve: "CVE-2022-0005", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-0005", }, { cve: "CVE-2021-39298", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-39298", }, { cve: "CVE-2021-33124", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33124", }, { cve: "CVE-2021-33123", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33123", }, { cve: "CVE-2021-33122", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33122", }, { cve: "CVE-2021-33117", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33117", }, { cve: "CVE-2021-33103", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33103", }, { cve: "CVE-2021-26390", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26390", }, { cve: "CVE-2021-26388", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26388", }, { cve: "CVE-2021-26386", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26386", }, { cve: "CVE-2021-26384", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26384", }, { cve: "CVE-2021-26378", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26378", }, { cve: "CVE-2021-26376", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26376", }, { cve: "CVE-2021-26375", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26375", }, { cve: "CVE-2021-26373", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26373", }, { cve: "CVE-2021-26372", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26372", }, { cve: "CVE-2021-26369", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26369", }, { cve: "CVE-2021-26368", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26368", }, { cve: "CVE-2021-26366", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26366", }, { cve: "CVE-2021-26364", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26364", }, { cve: "CVE-2021-26363", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26363", }, { cve: "CVE-2021-26362", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26362", }, { cve: "CVE-2021-26361", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26361", }, { cve: "CVE-2021-26352", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26352", }, { cve: "CVE-2021-26351", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26351", }, { cve: "CVE-2021-26350", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26350", }, { cve: "CVE-2021-26349", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26349", }, { cve: "CVE-2021-26348", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26348", }, { cve: "CVE-2021-26347", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26347", }, { cve: "CVE-2021-26342", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26342", }, { cve: "CVE-2021-26339", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26339", }, { cve: "CVE-2021-26337", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26337", }, { cve: "CVE-2021-26336", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26336", }, { cve: "CVE-2021-26335", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26335", }, { cve: "CVE-2021-26317", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26317", }, { cve: "CVE-2021-26312", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26312", }, { cve: "CVE-2021-21136", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-21136", }, { cve: "CVE-2021-21131", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-21131", }, { cve: "CVE-2021-0190", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0190", }, { cve: "CVE-2021-0189", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0189", }, { cve: "CVE-2021-0188", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0188", }, { cve: "CVE-2021-0159", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0159", }, { cve: "CVE-2021-0155", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0155", }, { cve: "CVE-2021-0154", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0154", }, { cve: "CVE-2021-0153", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0153", }, { cve: "CVE-2020-12951", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12951", }, { cve: "CVE-2020-12946", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12946", }, { cve: "CVE-2020-12944", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12944", }, { cve: "CVE-2020-12931", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12931", }, ], }
WID-SEC-W-2023-0061
Vulnerability from csaf_certbund
Published
2023-01-10 23:00
Modified
2023-05-10 22:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Prozessoren sind die zentralen Rechenwerke eines Computers.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0061 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0061.json", }, { category: "self", summary: "WID-SEC-2023-0061 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0061", }, { category: "external", summary: "Lenovo Security Advisory: LEN-124495", url: "https://support.lenovo.com/de/de/product_security/ps500559-multi-vendor-bios-security-vulnerabilities-may-2023", }, { category: "external", summary: "HP Security Bulletin HPSBHF03846 vom 2023-05-11", url: "https://support.hp.com/us-en/document/ish_8109529-8109560-16/HPSBHF03846", }, { category: "external", summary: "Dell Security Advisory DSA-2023-002", url: "https://www.dell.com/support/kbdoc/de-de/000207371/dsa-2023-002-dell-poweredge-server-security-update-for-amd-server-vulnerabilities", }, { category: "external", summary: "AMD Client Vulnerabilities - January 2023 vom 2023-01-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1031", }, { category: "external", summary: "AMD Server Vulnerabilities - January 2023 vom 2023-01-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1032", }, { category: "external", summary: "Lenovo Security Advisory vom 2023-01-10", url: "https://support.lenovo.com/de/de/product_security/ps500538-amd-server-vulnerabilities-january-2023", }, { category: "external", summary: "Lenovo Security Advisory vom 2023-01-10", url: "https://support.lenovo.com/de/de/product_security/ps500539-amd-client-vulnerabilities-january-2023", }, { category: "external", summary: "HP Security Bulletin HPSBHF03831 vom 2023-01-11", url: "https://support.hp.com/us-en/document/ish_7491443-7491471-16/HPSBHF03831", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404", }, ], source_lang: "en-US", title: "AMD Prozessoren: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-10T22:00:00.000+00:00", generator: { date: "2024-08-15T17:41:05.996+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0061", initial_release_date: "2023-01-10T23:00:00.000+00:00", revision_history: [ { date: "2023-01-10T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-01-11T23:00:00.000+00:00", number: "2", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-01-22T23:00:00.000+00:00", number: "3", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-04-02T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Dell aufgenommen", }, { date: "2023-05-10T22:00:00.000+00:00", number: "5", summary: "Neue Updates von HP und LENOVO aufgenommen", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "AMD Prozessor", product: { name: "AMD Prozessor", product_id: "T019554", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:-", }, }, }, ], category: "vendor", name: "AMD", }, { branches: [ { category: "product_name", name: "Dell Computer", product: { name: "Dell Computer", product_id: "T006498", product_identification_helper: { cpe: "cpe:/o:dell:dell_computer:-", }, }, }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "HP Computer", product: { name: "HP Computer", product_id: "T023191", product_identification_helper: { cpe: "cpe:/h:hp:computer:-", }, }, }, ], category: "vendor", name: "HP", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "Lenovo BIOS", product: { name: "Lenovo BIOS", product_id: "T005651", product_identification_helper: { cpe: "cpe:/h:lenovo:bios:-", }, }, }, { category: "product_name", name: "Lenovo Computer", product: { name: "Lenovo Computer", product_id: "T006520", product_identification_helper: { cpe: "cpe:/o:lenovo:lenovo_computer:-", }, }, }, ], category: "vendor", name: "Lenovo", }, ], }, vulnerabilities: [ { cve: "CVE-2021-26316", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26316", }, { cve: "CVE-2021-26328", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26328", }, { cve: "CVE-2021-26343", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26343", }, { cve: "CVE-2021-26346", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26346", }, { cve: "CVE-2021-26353", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26353", }, { cve: "CVE-2021-26355", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26355", }, { cve: "CVE-2021-26391", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26391", }, { cve: "CVE-2021-26396", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26396", }, { cve: "CVE-2021-26398", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26398", }, { cve: "CVE-2021-26402", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26402", }, { cve: "CVE-2021-26403", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26403", }, { cve: "CVE-2021-26404", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26404", }, { cve: "CVE-2021-26407", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26407", }, { cve: "CVE-2021-26409", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26409", }, { cve: "CVE-2021-39298", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-39298", }, { cve: "CVE-2021-46767", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46767", }, { cve: "CVE-2021-46768", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46768", }, { cve: "CVE-2021-46779", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46779", }, { cve: "CVE-2021-46791", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46791", }, { cve: "CVE-2021-46795", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46795", }, { cve: "CVE-2022-23813", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2022-23813", }, { cve: "CVE-2022-23814", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2022-23814", }, { cve: "CVE-2023-20522", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20522", }, { cve: "CVE-2023-20523", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20523", }, { cve: "CVE-2023-20525", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20525", }, { cve: "CVE-2023-20527", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20527", }, { cve: "CVE-2023-20528", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20528", }, { cve: "CVE-2023-20529", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20529", }, { cve: "CVE-2023-20530", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20530", }, { cve: "CVE-2023-20531", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20531", }, { cve: "CVE-2023-20532", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20532", }, ], }
WID-SEC-W-2023-0165
Vulnerability from csaf_certbund
Published
2022-02-16 23:00
Modified
2023-01-22 23:00
Summary
HP BIOS UEFI Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erhöhen.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0165 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0165.json", }, { category: "self", summary: "WID-SEC-2023-0165 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0165", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404", }, { category: "external", summary: "HP Customer Support - Knowledge Base vom 2022-02-16", url: "https://support.hp.com/us-en/document/ish_5661066-5661090-16", }, ], source_lang: "en-US", title: "HP BIOS UEFI Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation", tracking: { current_release_date: "2023-01-22T23:00:00.000+00:00", generator: { date: "2024-08-15T17:42:03.562+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0165", initial_release_date: "2022-02-16T23:00:00.000+00:00", revision_history: [ { date: "2022-02-16T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-01-22T23:00:00.000+00:00", number: "2", summary: "Neue Updates von HP aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "HP BIOS UEFI Firmware", product: { name: "HP BIOS UEFI Firmware", product_id: "T022097", product_identification_helper: { cpe: "cpe:/h:hp:bios:uefi_firmware", }, }, }, ], category: "vendor", name: "HP", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, ], category: "vendor", name: "HPE", }, ], }, vulnerabilities: [ { cve: "CVE-2021-39297", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39297", }, { cve: "CVE-2021-39298", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39298", }, { cve: "CVE-2021-39299", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39299", }, { cve: "CVE-2021-39300", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39300", }, { cve: "CVE-2021-39301", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39301", }, ], }
wid-sec-w-2023-0061
Vulnerability from csaf_certbund
Published
2023-01-10 23:00
Modified
2023-05-10 22:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Prozessoren sind die zentralen Rechenwerke eines Computers.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0061 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0061.json", }, { category: "self", summary: "WID-SEC-2023-0061 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0061", }, { category: "external", summary: "Lenovo Security Advisory: LEN-124495", url: "https://support.lenovo.com/de/de/product_security/ps500559-multi-vendor-bios-security-vulnerabilities-may-2023", }, { category: "external", summary: "HP Security Bulletin HPSBHF03846 vom 2023-05-11", url: "https://support.hp.com/us-en/document/ish_8109529-8109560-16/HPSBHF03846", }, { category: "external", summary: "Dell Security Advisory DSA-2023-002", url: "https://www.dell.com/support/kbdoc/de-de/000207371/dsa-2023-002-dell-poweredge-server-security-update-for-amd-server-vulnerabilities", }, { category: "external", summary: "AMD Client Vulnerabilities - January 2023 vom 2023-01-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1031", }, { category: "external", summary: "AMD Server Vulnerabilities - January 2023 vom 2023-01-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1032", }, { category: "external", summary: "Lenovo Security Advisory vom 2023-01-10", url: "https://support.lenovo.com/de/de/product_security/ps500538-amd-server-vulnerabilities-january-2023", }, { category: "external", summary: "Lenovo Security Advisory vom 2023-01-10", url: "https://support.lenovo.com/de/de/product_security/ps500539-amd-client-vulnerabilities-january-2023", }, { category: "external", summary: "HP Security Bulletin HPSBHF03831 vom 2023-01-11", url: "https://support.hp.com/us-en/document/ish_7491443-7491471-16/HPSBHF03831", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404", }, ], source_lang: "en-US", title: "AMD Prozessoren: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-10T22:00:00.000+00:00", generator: { date: "2024-08-15T17:41:05.996+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0061", initial_release_date: "2023-01-10T23:00:00.000+00:00", revision_history: [ { date: "2023-01-10T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-01-11T23:00:00.000+00:00", number: "2", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-01-22T23:00:00.000+00:00", number: "3", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-04-02T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Dell aufgenommen", }, { date: "2023-05-10T22:00:00.000+00:00", number: "5", summary: "Neue Updates von HP und LENOVO aufgenommen", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "AMD Prozessor", product: { name: "AMD Prozessor", product_id: "T019554", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:-", }, }, }, ], category: "vendor", name: "AMD", }, { branches: [ { category: "product_name", name: "Dell Computer", product: { name: "Dell Computer", product_id: "T006498", product_identification_helper: { cpe: "cpe:/o:dell:dell_computer:-", }, }, }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "HP Computer", product: { name: "HP Computer", product_id: "T023191", product_identification_helper: { cpe: "cpe:/h:hp:computer:-", }, }, }, ], category: "vendor", name: "HP", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "Lenovo BIOS", product: { name: "Lenovo BIOS", product_id: "T005651", product_identification_helper: { cpe: "cpe:/h:lenovo:bios:-", }, }, }, { category: "product_name", name: "Lenovo Computer", product: { name: "Lenovo Computer", product_id: "T006520", product_identification_helper: { cpe: "cpe:/o:lenovo:lenovo_computer:-", }, }, }, ], category: "vendor", name: "Lenovo", }, ], }, vulnerabilities: [ { cve: "CVE-2021-26316", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26316", }, { cve: "CVE-2021-26328", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26328", }, { cve: "CVE-2021-26343", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26343", }, { cve: "CVE-2021-26346", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26346", }, { cve: "CVE-2021-26353", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26353", }, { cve: "CVE-2021-26355", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26355", }, { cve: "CVE-2021-26391", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26391", }, { cve: "CVE-2021-26396", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26396", }, { cve: "CVE-2021-26398", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26398", }, { cve: "CVE-2021-26402", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26402", }, { cve: "CVE-2021-26403", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26403", }, { cve: "CVE-2021-26404", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26404", }, { cve: "CVE-2021-26407", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26407", }, { cve: "CVE-2021-26409", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-26409", }, { cve: "CVE-2021-39298", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-39298", }, { cve: "CVE-2021-46767", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46767", }, { cve: "CVE-2021-46768", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46768", }, { cve: "CVE-2021-46779", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46779", }, { cve: "CVE-2021-46791", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46791", }, { cve: "CVE-2021-46795", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2021-46795", }, { cve: "CVE-2022-23813", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2022-23813", }, { cve: "CVE-2022-23814", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2022-23814", }, { cve: "CVE-2023-20522", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20522", }, { cve: "CVE-2023-20523", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20523", }, { cve: "CVE-2023-20525", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20525", }, { cve: "CVE-2023-20527", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20527", }, { cve: "CVE-2023-20528", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20528", }, { cve: "CVE-2023-20529", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20529", }, { cve: "CVE-2023-20530", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20530", }, { cve: "CVE-2023-20531", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20531", }, { cve: "CVE-2023-20532", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310", ], }, release_date: "2023-01-10T23:00:00.000+00:00", title: "CVE-2023-20532", }, ], }
wid-sec-w-2023-0165
Vulnerability from csaf_certbund
Published
2022-02-16 23:00
Modified
2023-01-22 23:00
Summary
HP BIOS UEFI Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erhöhen.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0165 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0165.json", }, { category: "self", summary: "WID-SEC-2023-0165 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0165", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404", }, { category: "external", summary: "HP Customer Support - Knowledge Base vom 2022-02-16", url: "https://support.hp.com/us-en/document/ish_5661066-5661090-16", }, ], source_lang: "en-US", title: "HP BIOS UEFI Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation", tracking: { current_release_date: "2023-01-22T23:00:00.000+00:00", generator: { date: "2024-08-15T17:42:03.562+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0165", initial_release_date: "2022-02-16T23:00:00.000+00:00", revision_history: [ { date: "2022-02-16T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-01-22T23:00:00.000+00:00", number: "2", summary: "Neue Updates von HP aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "HP BIOS UEFI Firmware", product: { name: "HP BIOS UEFI Firmware", product_id: "T022097", product_identification_helper: { cpe: "cpe:/h:hp:bios:uefi_firmware", }, }, }, ], category: "vendor", name: "HP", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, ], category: "vendor", name: "HPE", }, ], }, vulnerabilities: [ { cve: "CVE-2021-39297", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39297", }, { cve: "CVE-2021-39298", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39298", }, { cve: "CVE-2021-39299", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39299", }, { cve: "CVE-2021-39300", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39300", }, { cve: "CVE-2021-39301", notes: [ { category: "description", text: "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht näher beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "T009310", "T022097", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2021-39301", }, ], }
wid-sec-w-2022-0073
Vulnerability from csaf_certbund
Published
2022-05-10 22:00
Modified
2024-02-13 23:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Prozessoren sind die zentralen Rechenwerke eines Computers.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0073 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json", }, { category: "self", summary: "WID-SEC-2022-0073 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073", }, { category: "external", summary: "AMD Security Advisory vom 2022-05-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { category: "external", summary: "AMD Security Advisory vom 2022-05-10", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", }, { category: "external", summary: "Lenovo Security Advisory vom 2022-05-10", url: "https://support.lenovo.com/us/en/product_security/LEN-87863", }, { category: "external", summary: "HP Security Bulletin HPSBHF03792 vom 2022-05-12", url: "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792", }, { category: "external", summary: "HPE Security Bulletin HPESBHF04235 vom 2022-05-17", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us&hprpt_id=ALERT_HPE_3023598&jumpid=em_pom8nu6hj_aid-520066529", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07", url: "https://alas.aws.amazon.com/ALAS-2022-1606.html", }, { category: "external", summary: "HPE Security Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404", }, { category: "external", summary: "AMD Security Bulletin", url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html", }, ], source_lang: "en-US", title: "AMD Prozessoren: Mehrere Schwachstellen", tracking: { current_release_date: "2024-02-13T23:00:00.000+00:00", generator: { date: "2024-08-15T17:26:24.486+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0073", initial_release_date: "2022-05-10T22:00:00.000+00:00", revision_history: [ { date: "2022-05-10T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-05-12T22:00:00.000+00:00", number: "2", summary: "Neue Updates von HP aufgenommen", }, { date: "2022-05-17T22:00:00.000+00:00", number: "3", summary: "Neue Updates von HPE aufgenommen", }, { date: "2022-05-19T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon und SUSE aufgenommen", }, { date: "2022-05-26T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-02T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-07T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-07T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-01-22T23:00:00.000+00:00", number: "9", summary: "Neue Updates von HP aufgenommen", }, { date: "2023-04-02T22:00:00.000+00:00", number: "10", summary: "CVE's ergänzt", }, { date: "2024-02-13T23:00:00.000+00:00", number: "11", summary: "Neue Updates von AMD aufgenommen", }, ], status: "final", version: "11", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Epyc", product: { name: "AMD Prozessor Epyc", product_id: "T020995", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:epyc", }, }, }, { category: "product_version", name: "Ryzen", product: { name: "AMD Prozessor Ryzen", product_id: "T023180", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:ryzen", }, }, }, { category: "product_version", name: "Athlon", product: { name: "AMD Prozessor Athlon", product_id: "T023181", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:athlon", }, }, }, { category: "product_name", name: "AMD Prozessor", product: { name: "AMD Prozessor", product_id: "T029010", product_identification_helper: { cpe: "cpe:/h:amd:amd_processor:-", }, }, }, ], category: "product_name", name: "Prozessor", }, ], category: "vendor", name: "AMD", }, { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "HP Computer", product: { name: "HP Computer", product_id: "T023191", product_identification_helper: { cpe: "cpe:/h:hp:computer:-", }, }, }, ], category: "vendor", name: "HP", }, { branches: [ { category: "product_name", name: "HPE ProLiant", product: { name: "HPE ProLiant", product_id: "T009310", product_identification_helper: { cpe: "cpe:/h:hp:proliant:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "Lenovo Computer", product: { name: "Lenovo Computer", product_id: "T006520", product_identification_helper: { cpe: "cpe:/o:lenovo:lenovo_computer:-", }, }, }, ], category: "vendor", name: "Lenovo", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20559", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2023-20559", }, { cve: "CVE-2023-20558", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2023-20558", }, { cve: "CVE-2022-21151", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-21151", }, { cve: "CVE-2022-0005", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2022-0005", }, { cve: "CVE-2021-39298", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-39298", }, { cve: "CVE-2021-33124", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33124", }, { cve: "CVE-2021-33123", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33123", }, { cve: "CVE-2021-33122", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33122", }, { cve: "CVE-2021-33117", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33117", }, { cve: "CVE-2021-33103", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-33103", }, { cve: "CVE-2021-26390", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26390", }, { cve: "CVE-2021-26388", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26388", }, { cve: "CVE-2021-26386", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26386", }, { cve: "CVE-2021-26384", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26384", }, { cve: "CVE-2021-26378", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26378", }, { cve: "CVE-2021-26376", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26376", }, { cve: "CVE-2021-26375", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26375", }, { cve: "CVE-2021-26373", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26373", }, { cve: "CVE-2021-26372", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26372", }, { cve: "CVE-2021-26369", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26369", }, { cve: "CVE-2021-26368", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26368", }, { cve: "CVE-2021-26366", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26366", }, { cve: "CVE-2021-26364", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26364", }, { cve: "CVE-2021-26363", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26363", }, { cve: "CVE-2021-26362", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26362", }, { cve: "CVE-2021-26361", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26361", }, { cve: "CVE-2021-26352", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26352", }, { cve: "CVE-2021-26351", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26351", }, { cve: "CVE-2021-26350", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26350", }, { cve: "CVE-2021-26349", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26349", }, { cve: "CVE-2021-26348", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26348", }, { cve: "CVE-2021-26347", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26347", }, { cve: "CVE-2021-26342", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26342", }, { cve: "CVE-2021-26339", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26339", }, { cve: "CVE-2021-26337", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26337", }, { cve: "CVE-2021-26336", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26336", }, { cve: "CVE-2021-26335", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26335", }, { cve: "CVE-2021-26317", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26317", }, { cve: "CVE-2021-26312", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-26312", }, { cve: "CVE-2021-21136", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-21136", }, { cve: "CVE-2021-21131", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-21131", }, { cve: "CVE-2021-0190", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0190", }, { cve: "CVE-2021-0189", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0189", }, { cve: "CVE-2021-0188", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0188", }, { cve: "CVE-2021-0159", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0159", }, { cve: "CVE-2021-0155", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0155", }, { cve: "CVE-2021-0154", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0154", }, { cve: "CVE-2021-0153", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2021-0153", }, { cve: "CVE-2020-12951", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12951", }, { cve: "CVE-2020-12946", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12946", }, { cve: "CVE-2020-12944", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12944", }, { cve: "CVE-2020-12931", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erhöhte Rechte.", }, ], product_status: { known_affected: [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310", ], }, release_date: "2022-05-10T22:00:00.000+00:00", title: "CVE-2020-12931", }, ], }
fkie_cve-2021-39298
Vulnerability from fkie_nvd
Published
2022-02-16 17:15
Modified
2024-11-21 06:19
Severity ?
Summary
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E3D0268-99F9-470C-A2C1-C8667BCE3828", versionEndExcluding: "02.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", matchCriteriaId: "02EB5330-7C9B-4CE4-AF6B-18D0ED8D2D1D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85837EF3-C3E4-4BFA-8416-2D237A6177C7", versionEndExcluding: "02.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", matchCriteriaId: "C0D9DCC9-8EB2-481E-BBAF-DD738E83AC25", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C872354-7197-465A-B691-3BD20A229CA8", versionEndExcluding: "02.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "C2A41ADB-202C-46AD-AFBA-6F060FA3502F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:linux_kernel:*:*", matchCriteriaId: "DC137328-5573-4781-8DA2-B135CD44533A", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_10:*:*", matchCriteriaId: "6E2C4D23-D2FA-4C89-B4C2-C775A17A21C0", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_7:*:*", matchCriteriaId: "ADA3082C-BC33-4464-8FC3-F45A859A2DB8", versionEndExcluding: "02.75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z4_g4_workstation_\\(core-x\\):-:*:*:*:*:*:*:*", matchCriteriaId: "AEAD0B9A-B36F-4C48-AFBB-D71192899993", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:linux_kernel:*:*", matchCriteriaId: "D9B59BE0-2D53-4D59-846B-80F47B7B836E", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_10:*:*", matchCriteriaId: "88774B45-D51B-4971-9FD0-AA15523F3788", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_7:*:*", matchCriteriaId: "FF6DFFBF-C17E-4FF7-B4A9-693D42A1C42B", versionEndExcluding: "02.75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z4_g4_workstation_\\(xeon_w\\):-:*:*:*:*:*:*:*", matchCriteriaId: "69EBF60B-E2A4-492B-A58F-2A01B77AE74A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", matchCriteriaId: "83CC465C-DFFD-4C9C-881C-97B59410EC36", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", matchCriteriaId: "790D9AFB-2AFC-4635-A556-3C91403FE6BD", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", matchCriteriaId: "77E66B91-184D-49B5-9685-96995F2B1C07", versionEndExcluding: "02.75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD26B60-086E-4C83-B3EB-CA4981AAAF7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", matchCriteriaId: "EA52B0BD-5AF3-4079-B25B-993CA85CB115", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", matchCriteriaId: "6D033ECD-5E03-4A57-AA34-BA92A6525865", versionEndExcluding: "02.75", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", matchCriteriaId: "BAFCE15A-5D6A-4AB1-AC68-4AB1E0E55EFF", versionEndExcluding: "02.75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*", matchCriteriaId: "068354B9-5842-4014-A466-011FA1AA62B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB0213EB-A71F-4CB0-8D14-4A0C7008B59C", versionEndExcluding: "02.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", matchCriteriaId: "8187C850-4BB8-474A-B5D2-09560AAF47D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B0C3ABB0-30EE-402A-A655-EF1AB8CFDEE4", versionEndExcluding: "02.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", matchCriteriaId: "4B81932E-C047-45A8-80DD-32E19351D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4FCCC71-FA95-43DD-9874-FC873252B614", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", matchCriteriaId: "119A1751-0FD4-4FA7-8681-CC82C4D47BFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83CE6347-D6CF-421E-A8B4-D087E4C242F6", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "28829816-379A-43CA-B2B0-2DDC32C9EFA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3AC42EBC-B581-4102-B614-C8DDB37A5ED8", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", matchCriteriaId: "301EE3DA-31B5-44E3-B6B7-1E3A87B24F65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5199F27-D189-4663-AC00-7C63A4BD9900", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", matchCriteriaId: "E086097A-D53C-4AD2-891E-FEF5EE21B6AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DD025A26-8ED9-4A81-AE2D-DFEDBAE336D8", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", matchCriteriaId: "72682A82-B694-4CE0-9B88-DCAAC8A6C8B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7FC3266B-99F0-4F25-B923-154522B8833B", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*", matchCriteriaId: "C181FFEA-FF8C-4FFF-AB13-6F660FD54737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6965EE-5FA5-4DD5-B1B7-339181E90A00", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", matchCriteriaId: "3F4E2D01-4CC3-4FBB-8B49-0C087DC580FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8AD6BBB-F010-4A24-A958-FD91303C46FE", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "9E8BCBD1-AB54-4160-9FEC-426B3905A56A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4582CD80-9128-41C3-8F11-268B3C484E97", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "7A8707F9-46CB-48F7-8CFA-EE90F44D5585", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7036932C-2519-4415-B770-65F9E87B4C8D", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "127371E2-74C1-41E8-8D0C-8551E4B6A656", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA6A472F-0B69-46EC-A8B7-E6D35BB54EA1", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "D306687B-3EF9-40B4-88E1-F9840FBF332C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "31B20FC9-4E17-49A9-9ADB-51023CA8DE4C", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "A30065E2-A918-499B-864F-50C12E7699EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F815D088-2416-4DDB-BE7A-8DEF2C79266B", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "663E72B3-5986-434C-B395-43CF1A461A55", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A01005B3-2613-4991-9D13-186E5EE129AD", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "A5446ABE-8540-4DF0-A3EA-BEE74199856C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0890E78-D869-45C4-8FE9-023B7392230B", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "36FA123E-719F-465F-A89C-D15E79360A96", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5EB5590-0502-4DD2-82EE-B0E996BA7853", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "370DA2D2-F41F-4569-A58D-A38C6B9AC01B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8449A10-2386-4BC9-B6A7-4D7B724D5E5F", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "B5091726-485B-4F0D-A451-8FA3FF10B952", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B353663-91A0-49C5-BF31-F066635D77AC", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "02654E2D-30A7-4A07-AD0A-10402AD2CD7D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CC73DD1-8996-4A07-BB7F-3CAD5B8DF839", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "2A024B6E-6F91-47AB-B29D-659A7F2A0595", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24DE0204-652E-4E87-A605-68C2EDFAAFBE", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "A27335B7-81BA-4A1D-922B-CE34EBD31A60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71359566-0D9E-4558-BCC6-AAB4A37CF793", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF12568-610A-40BA-A29D-946298512F74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "650BE1D6-4959-4B52-B764-48A480E88F4B", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "74BBE35C-34BF-49B0-9501-7A6ABE8799E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D663A797-6C56-497F-BF1C-506D22F05F00", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "DC2EB22C-6899-4C3B-BA7D-882351D6FC2E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BBD65A6-642F-47F1-B6B2-9EE97A9DEC2C", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "DC02312C-289C-445B-8FC6-D5854EA44F87", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBBAD7A6-FF7C-4667-B9F2-1E8A9BF14590", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "E6F752EC-E05D-416D-99D3-7DEFDA160755", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C66FCA12-6232-45AF-8545-6308EE5DA86F", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "BCEF5B4C-DB2B-4406-8EE1-7E5A63E89045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "586AC3DA-3CF3-4746-80B6-13459109A4DC", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", matchCriteriaId: "79A72152-CDBC-4709-B484-9259E9EAB82D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3FFAF331-B433-4672-AF2F-4CEFC9CE1251", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", matchCriteriaId: "201BF348-CDDE-4ED8-9339-0830AEE5B208", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B652E6FF-4AF9-4CD2-BA26-D71DE4FC4721", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "56DFE16C-A6BC-485F-A77F-A892889BBB64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40E842B2-E3FB-43DA-9BD3-18D77258C6BC", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C27ABA-63FC-4DCE-925A-1C8A3D5D73F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6721D77-E09B-4F2F-BA6F-CB3265010486", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "7B86EC79-4160-4118-8D0B-4CBA069976E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0CD1A70-9F2E-4B9D-A2C7-B280C0B9642A", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "485F527D-CED9-4865-BF19-0E474ED5C177", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91A0AF80-8759-41C5-B0F2-370B96647271", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "8E98FB1B-AC60-4432-B67A-926DF0F7AFD4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0EC0782-B8AF-4B2B-B8F5-BBBA95CEB010", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3FE302-C270-4C5E-B8AF-A140843E7E3C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43CD2A63-737A-4D74-BFE7-4FDDD21968E9", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "17C439DA-9B30-47B3-843C-B3A220A5159D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD3E5AE3-EF42-420C-A29F-9F5F06B7B974", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "707ACE08-2017-4A78-837F-BEBC02929E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00A1EFA0-07AB-430D-B9ED-7F6F84EDDE67", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "DDDE2542-2C2F-4295-91A1-F09E308C5B5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDE0DC18-44CA-4191-A787-555C773DAFAA", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "87B40BA1-1F6C-4786-9F33-52EEF0ADE083", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7BD781FA-CF82-49DF-AD6A-C54B5659259F", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "9FE8B02E-2DBD-4E4D-9B8B-E6E916709327", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7B5C798F-9C96-4C99-9F70-026F3B3657B5", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "14F18988-4CB2-43D3-ACC5-882695D713D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E1D6CC1-C0CD-472F-8C9E-00F27B4C8B5F", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "99C64369-5FDB-4584-AAB6-C87B95DA5FB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54AB35E4-8827-4848-853D-B392C7C88F27", versionEndExcluding: "01.08.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "986AAA40-9DC9-4D20-A4DA-2D02636C1A62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FD1C410-2224-4272-B178-562E5AE9A94B", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "3AD00A6D-426F-4470-A07C-A9E319A813B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F243AEAD-C4FD-4F39-8D55-CE26F364BF3A", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "5C45C4B7-1E60-40C3-AE9B-1928CFDD15BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F188BF61-13A7-4994-ABAC-3BA8DF74FD0E", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "F28CBAEA-21E2-4FB5-A3DF-B20145F63322", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "467B4707-142A-4A2A-851E-06D1C46791ED", versionEndExcluding: "01.08.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "2F93D1E8-C7A7-4B35-9389-AAC3DD0FA978", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9D190CAC-76EA-4436-8254-9DED818C4512", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "7910C11F-B709-45DC-B4EB-92B7A2001E13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C7D1DD2-CFBB-4E3E-8B48-214B014A13F0", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "B92A898F-BBDC-48B8-9159-8E0CD67AD6ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE3751D6-2B81-41FF-A8E7-D4BD7AD4B87D", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "F7A4B95B-48FA-493B-986C-F4E0C5E20183", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BA2A031-1AEB-4B3A-A173-BACF3EBFFA09", versionEndExcluding: "01.08.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "A1982269-50DD-4939-8158-4B7357D7AEE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E5E3301-3D69-4380-B96F-1F3E0FC5C375", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9871C2-D63F-4623-B8E0-1356A48554FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A52563B-DFAD-4F28-A939-1A2AE28983AA", versionEndExcluding: "01.08.01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "80EF159A-302D-4F73-8A08-683805B051A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3DC2695D-8CDE-4208-8A16-E8F7F5151A9C", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", matchCriteriaId: "0E458FE6-3295-4982-BCCD-8BF1BDBCA8B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "126B6E1B-5CBD-4B22-9885-C86B9C3D5737", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "657F2CA6-D464-466F-BB6F-11316D3E27DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04DBCD9D-54E4-47C3-8155-7367D9E43BFB", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "D01A2D5C-89B8-4609-909C-245DF7A15912", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2F7BE714-F56C-4EEE-9FC0-543FF17AF860", versionEndExcluding: "01.08.01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "C6351F53-2458-47FB-B547-C56691B7CF50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FD13471F-E05D-4ECB-BCA4-AA34B495B1AC", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", matchCriteriaId: "389760F8-5B6B-40DD-9F8D-A542CABBD4FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AFD1502-C6CE-4971-8ADB-5A4DC2F8B4B8", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "E8F15254-6AF1-4495-B89F-F58084D11D36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49971E3F-92A1-4A9F-91FF-91DEBF6E8BB0", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "E3AE72B1-6CEF-4F42-8196-8B260F3ED219", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "738DA3C3-B7C4-4537-99B5-F4A2EDB478AA", versionEndExcluding: "01.08.01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "ED793F1B-C4A0-41B7-856B-20CF33308750", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "769A944E-5259-4B7C-AC91-76497981621E", versionEndExcluding: "01.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC67078-7715-4A45-A1B4-89D2B7196AE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B911F5A-1032-4AD2-AB5F-19DC2BAD892A", versionEndExcluding: "01.13.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "AE118D9C-6CCF-4063-891C-A87E5CEAA181", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28FFF7D0-03C4-4B20-9666-A58B8A1CF6C7", versionEndExcluding: "01.09.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "151C6B17-477C-44F7-8701-DA9E35981379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81BF086A-9043-4279-B0BB-C28E5266CF8B", versionEndExcluding: "01.09.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "D3688601-B128-4BEA-980D-DC3325343662", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "479DA25B-CBBA-4735-8366-19C97F2E1114", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "48A3E458-BE55-437B-9303-CCAE23C40ACE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "31412E71-045E-4B40-8F28-CDC0873104A9", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", matchCriteriaId: "7532BAA7-ABDC-4283-91AC-56A30994F0BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4BFA7B22-C27D-4948-B262-711961B578CF", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "7DF860CD-924C-4A15-AD82-FDBCF7C13F43", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FF4C9066-374E-4E80-B869-C1434780D6F6", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "740E81D7-398A-4DDE-92A7-B89BABCEB4FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "135441B1-A6F3-40F1-A130-91F1EC8FA1DD", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "03B95D51-A675-4995-9F43-0C53CC7C9035", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8728F160-4B47-42BB-9346-0683B67AD29A", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "ECC561D0-0216-4517-A551-166557FC5D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FD4767AF-B638-4DCF-91FB-D13DA49BCB37", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2F25C8-CCFC-47BA-B7F9-A86478245203", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19DCA0C1-E526-4DF3-8599-B59219589FF0", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "4F2EFA3E-8FDC-435B-AED8-4146826934E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED250C9F-E60F-4E78-81F2-7EACCD5FB58C", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "17DC385C-6789-4F1C-9280-9E5C7DE8EA11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2385933-DF9C-47A8-8565-D8EAF3549FA5", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", matchCriteriaId: "27439B52-B175-4D6F-8AE0-2D8648789D4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04A693EA-9603-4D91-AA9F-BE4A3AC86B38", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "F61956A9-8CFB-4B96-B068-878E0CFF13BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "020F41F8-69D4-4118-8CA0-E3752FFC60E0", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "F8669346-38FA-44C5-A712-2C0FCCFDD44E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "726C41E6-F299-4026-BADD-BC37D026E0D9", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "381B4451-AB62-444A-B34A-108EF21D84D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3F364173-9EDE-4C39-BABB-9F3538035B53", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "A07A7FB8-9EB1-46DE-9AD7-07D4DC2A7E06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "640C9068-7E29-4BC2-9C59-DBD405A7A368", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADBEE86-6EB5-4892-BAFE-AD37FFD13849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D964C206-5B2B-45F3-BAD2-489572A792F4", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "BC03BC1C-7FC2-4EC7-A806-8717413B1AED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C77CD9B3-A3D1-4FA6-9E40-C14A6F79AB82", versionEndExcluding: "01.08.01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "168E3BC4-9ED6-4863-B6E8-458EEF9E7339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15F9EE0F-A8A6-4888-98F5-4AF74425AD31", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "C7ECCEB4-60B6-454D-96F1-1CAAEA7CD223", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A0E656A-7904-4A2A-987D-53B9FD38D2E6", versionEndExcluding: "01.08.01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "64BAA40E-D254-463B-976F-A75898E20E67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4840180D-E1E1-4550-985E-42AC49384E82", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "F2312856-3674-475E-8450-4D10D9A5A9DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "94DDD00B-487D-4839-BEB5-8748AD772C51", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "CC5BA7CE-6BF2-408F-8B50-07B897342E52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B376E11-11D9-46D6-ABA0-FF1EA0645DEB", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*", matchCriteriaId: "24FB7C62-AD79-4F7A-8AA4-27B744B5F26C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB6FD126-4865-4855-9A4E-BD08FFFA66C7", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "F9D3558A-C998-40B9-9E52-5F581B74A3F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "271CCD58-E2D1-48B4-9871-1C6A5F1B25AF", versionEndExcluding: "01.08.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", matchCriteriaId: "E9E44F4E-85E6-471A-A85D-4D7B09B69F0C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B0202EB4-0693-43ED-B1C6-7B028701A957", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", matchCriteriaId: "7DA80A29-3C98-4767-B784-F2A13097741E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C4B45DC-DA76-48A6-8D98-D522128EE7FB", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "3AB9C53B-328F-449C-9137-D20B72031D8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1224114D-B82D-4A80-91CC-4CC6C29A00C3", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "FFA26D63-E18E-4AB8-950D-904CF3D62EB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85E87ADF-4724-46E0-B67B-0C54649BC659", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", matchCriteriaId: "3DA9E826-6EAA-45EE-8613-46EE025ECD65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D89DF58D-EE3A-41EA-848F-468E07780FF1", versionEndExcluding: "01.08.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", matchCriteriaId: "B9B9E550-4D16-430D-813E-B425BAFEA4C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29A11166-864C-42FE-AADA-8B04C274D921", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "36603B4C-F5C6-4075-BEB1-90401B5D3A2D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27D066B2-7A97-4948-AC59-430B87E18E92", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", matchCriteriaId: "69B4D838-F2FC-4F7B-B606-9F005D125FA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61429F91-58E2-48EE-9E50-F3B9D1AE2915", versionEndExcluding: "01.19.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", matchCriteriaId: "3654A9CC-CBF9-4045-A929-1458A2AE99FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FADB9E91-4397-40C8-BF24-4BB0683EC8F6", versionEndExcluding: "01.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5FBB0A-9A79-482F-9E59-2291712BD161", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "548B6DE2-E251-4D58-81AD-884F4576AE55", versionEndIncluding: "2.17.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "B7565B63-6B13-4F72-9538-845635B945DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "386FBD67-6C2C-4C60-93E6-0A308E5DDF3F", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "0D22A07E-3033-4B61-B366-E09FE72DF08B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FA20789-20F8-468C-BA4E-8F6C25A7D5C7", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB6F5B7-5248-45C8-B83E-5ADD8077E9D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C8675000-C780-4AAC-B110-A62B45878D73", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3D567DE-9D36-4B40-8847-AAD14E253CAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1453A48-B267-4B3C-A0C2-5A39468613DB", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "D7A503FF-6FAB-4B98-A01C-EEE0880EBCB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDBB384C-D46F-4018-A5FD-B4E3E7495A02", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5D53396C-8599-4D9E-9147-2C47945AF38C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDBB384C-D46F-4018-A5FD-B4E3E7495A02", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5D53396C-8599-4D9E-9147-2C47945AF38C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21AE541E-EC44-4A11-B5C1-3735C9EB92E4", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*", matchCriteriaId: "5DE7353B-4944-4703-B17D-FF73328D6B9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5252DEB-5D25-420C-956C-0613C6956C04", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "03790B11-60F3-4467-9159-2C5395235239", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4215483-D174-4000-9692-AA4576FBB13A", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "3F8E6C68-1086-4EA8-B8D0-E9EE9B9270F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C13165A-DA77-4CAC-B9A6-81559E771AAF", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "6BA51C81-1D34-4747-A262-B28566BB097E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01AF91A0-282E-4E3E-96CB-1866CC6F9298", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "82BF1386-C43B-4B27-BF7C-26D0FAF13B1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F2F3943-84C1-4C4E-9E90-95BF31C3C561", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "3C2BEB8B-BA79-4B40-8A35-6CD2545E1595", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEE243D0-FF62-4409-8EBB-F36B03E39B85", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "44A8DAD6-9F6D-4AC6-976C-3D4EC566A1CE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE96B118-36B1-47F0-BD79-7442105C6F87", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5993123E-068C-498A-B17F-8D9A45BA4510", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7657C542-ED48-4A86-B9D1-56D1C69EF3C8", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "2CE2056B-7AFB-40C7-B16D-891EFFD9C29C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6A91A8D-F8E6-4575-983D-E7DA65070B18", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "6E0679C9-65D0-48D6-A7B2-60B3411AEF84", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E3556A6-20CA-4FF7-B79F-B7042B723A45", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "E433E3CE-8920-4FE2-8C9E-06E02D5EF5B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A708017F-2D47-4BC3-B558-BE53FE45BF3C", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "614C6061-751F-4F8D-BDB0-225B0AD9779A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35027039-EEC5-453C-B5CA-0E008B8B986C", versionEndIncluding: "2.03.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "D07D9459-D011-4C13-A406-5DA58AD88080", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "73BB2DA7-7D09-4685-B5AC-6E9315E42A65", versionEndIncluding: "2.03.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "03B881AC-BAA0-495C-B336-050C25A2420B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3945E498-B34F-491A-B67D-496AC7D24CC6", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "69BF32D7-1115-4971-BE35-2254A6C566F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0AFEC77-9B32-4353-B81A-0EED73CA0467", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB467DC-D239-4459-BF9C-041D8EB8F51B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF60D396-C1B8-41EB-9560-3BBB9655B33D", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "EA5CE713-B07E-49C8-88CB-B16FA4752B16", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D244F930-2B60-4769-8CD4-9C042038ED7D", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "C276DE51-141A-49D0-9BE4-9F740D5A2F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC8D3CEB-F5AF-4FB2-8E7B-61C1BF11D703", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "D93B88FF-5E57-4DD9-9568-26306D068230", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4823EE58-C174-4C60-B0D9-96B682E79EB3", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEF73CA-7A05-4650-9081-0A501D09F551", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "841E0FD7-2512-46F2-8DB0-10747FC421B9", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "449CD858-582B-49CA-95CB-AFDD5302ACE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "324459DB-65E9-45EA-9333-95F956CA25BA", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "8E4CB0D3-2948-4D9B-8C48-CE6E9A8A2FAA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "232C50AA-162B-4D0D-B2D9-2E4BD99AEE72", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "79906731-74C1-4081-822F-29D0095F038A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F87CD4E9-0981-49E2-BD14-C71BFC01C121", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "6457F0D4-E6C7-414A-AAAD-0F61FFE8BA72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2BAAFD8-523E-449C-99FE-3E04D27C9DAB", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "4192B127-7DDA-47BA-A441-013061097ED9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5948DFE1-A3DB-4747-AEC9-1256CAE386AA", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "1C30F26F-C63A-4C95-AFAB-7B49B29C667C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C192881-CA4D-476A-AB86-6455CAFC797D", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "66ED0BFA-33B9-4850-A934-DCE0399BBC67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "20AE11EE-CD36-47A4-8245-8AA8DE777EFB", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*", matchCriteriaId: "6E633AD8-5971-4E37-86BD-83B309D1776E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35F011A8-0688-436A-89B2-E85C149B3549", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", matchCriteriaId: "AFC825D4-65D1-40BE-AAFB-9A1D117DE069", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1BDA03D-946E-4C24-B699-C1EE5F9B667C", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5DE92A90-5580-4BF6-B73F-ECEA4693048D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BEAAB0F3-49B9-4AA8-8D9B-69B2246E3B23", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "888AC622-8FB4-4D17-846F-1F9CCBB7EBFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "474023E5-9A9D-46A1-B414-A73002CFA76F", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "24380823-8372-4989-8EB9-46390A258B7E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FCD473F-0C75-4D81-B086-7AADEADBFCDE", versionEndIncluding: "2.07.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "919973B8-DA48-410A-B3D4-43A56E7BE381", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "818F199A-8694-42CE-9EA4-FEC1350EB9AB", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "7970A0E9-64DC-4CA0-A9CA-D06B2BBC42AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D8C5156B-E69D-4835-8E16-7BAB67AD89DC", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "E95BF30A-1785-4DE1-8272-29196C362C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DECC12A-E49B-44D8-A04D-F00EC4C2AB7F", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "3B2CA843-228C-42FE-8236-1C99B30862E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5B16CEC-8139-4E89-94EA-D5E297CEA431", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "8D168C72-E7A0-490C-A09C-A075F0C2BFB9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "739D9744-B075-40D0-AE69-90A5F6C5CA13", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "8DDBB3E4-A059-4DE9-B887-EAD8D0E34627", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FA0D65A-39F2-4205-A97E-5EED1A18B643", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5627AA12-2392-40E8-8A60-2B7FCA939DD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C93C14D-E95D-44B9-B13A-E622D7E11848", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "A41C8C9E-FCCA-4943-B4AF-7E252175619F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E3C53A9-F529-4B69-B83A-9B69160C4888", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "87157F17-55C7-4B67-A569-553DED315A2B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CABF07C3-5398-4632-9637-A36FCD1040C4", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "EF55615F-4964-4A6A-91E4-1DF00ABA9F98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D828606A-FE16-4E48-A29E-3FB90BECEA27", versionEndIncluding: "2.03.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "6089CFE4-9A55-484A-92DD-06ADA6C44792", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8AC88BE-779A-45CD-95FF-1CE541158112", versionEndIncluding: "2.03.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "CFAC2E25-2018-45F3-AF42-CE770A88384B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "232C554F-C097-4382-80B2-E2D833529142", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "97D3F8A6-877D-4819-A101-B85498D4AB2E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B69F84E-FFC4-4CE3-8710-6D75919A2BFC", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "1E56B264-71E2-4498-AB2D-F4EF3D1BD146", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CFCEF0C-BFA2-48FF-AE4A-43181D71444C", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "170C9213-D9D3-4528-8FA7-B4731A74CC36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3FF3CF3A-622E-4C32-AF6F-9D6C89F1B662", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "EDBB1855-A92B-4514-B0DE-CBD6D425866A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "788D9187-602F-492F-89D1-BA1C15ED8CDC", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "50DCF6A1-3209-4743-B1A5-774FE0BF25C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71ED3A81-58FF-4457-B995-42FF769F44B4", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", matchCriteriaId: "CF4AD5C3-C195-43C0-A3BA-890DD752D31D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2ECE739-98D4-4C76-A212-80DF4E81B0C5", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "A342E698-B741-4A24-A797-0940C007770F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7A380E5-6EC1-426D-ABBD-2E5C0556777B", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "168198E7-A2E4-4701-9088-1812C481EC44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BABD24F3-71E3-4B49-82CA-C9961C423C33", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "886E5433-52EE-4640-BC7D-52B96F1462EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC2B81EB-3D9B-4F12-8B09-D33C029CDDD2", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", matchCriteriaId: "A15C647C-9BFF-46AD-86D4-EC298251082E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43096AA3-F1F0-4DA3-93CD-4C71727E00CB", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5443815D-8487-423B-90C1-CE2BD0FCA5E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50165F13-7A1C-4447-A3DB-04B1E95FB002", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "BC90581B-B895-42A7-993C-1EF1F6B6F3B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AD72972-49A9-409E-9109-5CB0F03F0C0C", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "907BAC5B-0AC3-42CD-B145-754639D19E1C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FC526D5-5D25-4C0C-935B-2282B3C162E1", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "6E88C11F-4494-4E85-9ABC-9EC2A6000D4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8D7C1521-68B1-4602-AB5E-A3BB4C8356F1", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "565542BE-1CF9-49B9-AAA3-36ACC2A4542A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2623895-0CD2-475A-B320-B603CF727E5F", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", matchCriteriaId: "8DB4EEC5-121D-4F96-96AF-88B83CD81D70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07392785-E50B-4CA6-B835-0FB15D0006A3", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "11DB0F11-8DCE-4107-9F44-84719BCA0813", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C1131C8E-63D8-49E8-BDBE-27AF01FCC23B", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "45AB7CC1-0758-4734-9B6A-7F8CF6107F6D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCA47E40-DF50-44E6-A262-6C73497CCE25", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "68F00E1A-4DE9-4279-8C8B-3B6950B94354", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "477C1943-D5CC-4780-9EBA-641DB2B441A0", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "84E759D0-5DD6-4FD2-A19B-AEC9EF794B49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39D34B53-DBEB-4CF6-8B00-AFDA9A64B0EC", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "941BB9E1-9900-4258-A05F-31844B581A5E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B11A0FB-F222-40E9-A70D-07E969B643A3", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "9133486D-201B-4655-85E7-983B22408635", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C1353CD-E387-49CB-817D-FBBDC08DA499", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "B82E6B60-301C-4290-88ED-6A2A28CA1CD6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53F529E6-0D01-4351-ACB8-77C0EF338F90", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "3BEBA6E6-15F0-48B8-B7D8-12FE12FECFDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53785B1C-A705-4D8F-BC2C-7F16C6E12303", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "C9FEAE60-B7F7-4866-A8B4-4C750EFEE8A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2770447B-C933-4384-9E62-2533EFECC33B", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "5A01F60F-D076-4598-8119-679C9DE32E39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FA937A69-FF57-475A-8652-36D25E1E234D", versionEndIncluding: "2.18.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "CB542C59-F3B5-42B8-892C-8FCAAEFF81E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70DC685B-8778-4D10-BE55-178A179299EC", versionEndIncluding: "2.12.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "D55C0EC8-3FAD-45FA-9729-2C04BC14794A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6981E279-E529-432F-9BD6-E132571FC685", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "800F6A3F-3190-4386-B3DD-D2B3F4F0E995", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8ACF8FA2-2D5C-458D-8C31-FFFF98226677", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "7E0E53DC-2F0E-49C4-98BE-1657B65D5F2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B952BD6-48F0-4890-8897-1738526A9792", versionEndIncluding: "2.10.00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*", matchCriteriaId: "88559CE1-5B30-42AE-B136-89C11A0D36C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\n\n", }, { lang: "es", value: "Una potencial vulnerabilidad en el manejador de interrupciones del Modo de Gestión del Sistema (SMM) de AMD puede permitir a un atacante con altos privilegios acceder al SMM resultando en la ejecución de código arbitrario que podría ser utilizado por actores maliciosos para eludir los mecanismos de seguridad proporcionados en el firmware UEFI", }, ], id: "CVE-2021-39298", lastModified: "2024-11-21T06:19:09.240", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-16T17:15:10.860", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-jxf5-m5fg-rw27
Vulnerability from github
Published
2022-02-17 00:00
Modified
2022-05-13 00:00
Severity ?
Details
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
{ affected: [], aliases: [ "CVE-2021-39298", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-02-16T17:15:00Z", severity: "HIGH", }, details: "Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.", id: "GHSA-jxf5-m5fg-rw27", modified: "2022-05-13T00:00:39Z", published: "2022-02-17T00:00:32Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-39298", }, { type: "WEB", url: "https://support.hp.com/us-en/document/ish_5661066-5661090-16", }, { type: "WEB", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", }, { type: "WEB", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.