Search criteria
108 vulnerabilities by intel
CVE-2024-8105 (GCVE-0-2024-8105)
Vulnerability from cvelistv5 – Published: 2024-08-26 19:15 – Updated: 2025-08-25 21:48
VLAI?
Title
Insecure Platform Key (PK) used in UEFI system firmware signature
Summary
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
Severity ?
6.4 (Medium)
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Acer | vz2694g |
Affected:
d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6 , < 0
(sha256sum)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Binarly Research team
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-30T16:02:49.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/455367"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-8105",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-09T20:18:46.069299Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-09T20:21:06.044Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "vz2694g",
"vendor": "Acer",
"versions": [
{
"lessThan": "0",
"status": "affected",
"version": "d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6",
"versionType": "sha256sum"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s 27",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "2bd2bfaf79a72eaca45e544e5c6a5bb842b292bdc229b8975b3101a4013e0d5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s32-1856",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "29837e239487cc83818a7f40f9280d9692a50376487899edd603494b0f30e4c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire xc-1710",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "cdaa406bda1a58fbe9933622dec218a26f79871d42f0d3576fbf878e51a16201"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-1655",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "399f68dc94a6c42030efcd57fd034ff721f860b7b5d447779e7a6a6c99aba34f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire c22-1600",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "d938d08543d35d4249a51057c1d9c62bb1f6440af19913c5feffcea47dd3de95"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-962",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "3d525f96f63995c51ab1bcd2c50ebb71661ffeca9f78f97cc97e851d0e2bbbdd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680 f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "a2679a9595a104d70bddc024dbc4f65f0dc9d906f30a0d1ae6b996b14246a6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680s f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "e5fdaabf11b236c5c7b040d674936e84db746a180ab9999317e16dcb77aeeba4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iAPLx-DE(TAA30 TEST)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "94c6f84946db100b505af8a308f69ef6cddc2e310b50641a6e2e63bc9aed54e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iKBLMUx-DER(Volta Charging)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "fcd339e12730f057e41ad41228f9612d4954f2d0dbcfeef37e14dcdaf2866e05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3510-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7fbfd8b03d178e074572dff764f28af98c87c7556ce3837ccb8dfe993efa1940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x17-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "65f5939878deede2e1b24a6412ba025b78f45b1562e9d365d97e1c76a32a1832"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r4-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f75b595b9ce5e1e25a5d64e54edffdf696251b4f4e860c0d3a03a183631f090e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x14-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "620848eeadb74a572d6400672aecca35f46dfdc7b5152bb028fbcbf74ea7bccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-amd-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6348442334e85e8374884ea848685771053a7cf274ccb77559c710b5a00f61e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r3-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "413a04c12bde19f1f97d9d334ed57197f0405f9f10ab7154d2b71e5471577c97"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-area51m-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "253743e7a39d0b709122c5329799f4c4608536eeb632218e7f0cbe1f6e8b5db8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x15-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4fc54067f263791aed2fa4b57b226ea15c4eb0f55b3797e002bb62aa936bdd8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3521-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e2242e4aa3a284fcbbcf2f38a10bec24408f1eff74bb307e699ea46f483359f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r11-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "8f79d9de33f5f131226a78ccb10bb16218a5be51b2105cc32e38ceb0c8c30e9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3502-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "62c02a9b5a4d4328ac41c3e3aa7757e64e6c5cd52b9e047333ad18e60d17fcb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r13-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "dc5912033c5ca14475f2d59ca47f25c8840f362f0c8553d13bb06a8e47c42abf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8950-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6982be0bd8e1aed1251fe5300eec2b515b7cab70e761cfb72074f5d658d092d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7e310dca802db0f7a22d39bb2d7d5b79c7e9df8e5698f0e691942ec334ce5794"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r14-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "26a447a94e96fa8d9c590888cae490750c32d5af95faece3595f21efc41c1f2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r16-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "06a9dffc8fb3edafd1b6377cf38879860a0ae3c87f97258e09d189d291f64ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8960-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "0dcd7494f4926fb04b56e9713f0b62eff3a345b626fa2adaf47636bf0bb4c3eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m15-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "69da86e9cf24c49496529f3041604a6bb1c0c0ab86c192239d31d3a9b92467cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-3782-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "602a23f43b11817ad5439579969753866a54b836f34dfe19342e5188cf088d85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-15-r4",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "608e410d1c0475dac58b1e8f36b477aa8d9e9f28d30ec89d44b550e36bbbaf47"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-5680-gaming-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1075841f54237735c1135ebf92baeab9c0c3f8b051229f898520f5b0f265353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d4ed519bd5e5ba2f027d00635494d485f19f3080d8baf6d711b190323294e216"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "cb25317443d65ba126174c8b7547c7d2f6c0288f859e2063436eb7b350d9bf62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3472-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "02877ae1ee43c787fa980d6e897e14546ac193100395bbcc6bc26fdf3077e860"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r3",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "003130dabf11c8b5df286d9584b3174faa9529cd6149513d13c7ce85d63d97b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e6819bd24e063807336994f36e1b7cafbbec46c2679a365dde1b54b720a049e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-24-5460-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d54e560849c716d0ded4b25d9aacc746f77174cc6d3eeb3a50424eaf337c92aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-20-3059-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4b4fd4cc68e48cfbacaf1279ff42ce6e9d37aa7706efffb2a0bb84fbda2aabd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-5459-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2c6a0bd7b3a91b9e1b309bde7d405812a42abe40001ce661252d81e7cd009650"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3263-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "13deddbbdccb6e5411317e96bdb045e28c0dcbb7e86ed5f32e5d24b4b54a5657"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3250-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "95446bcddec63d36a9f5554815892c104febb73c676a075d789e4b7c69979fa6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3464-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "3ffd081959db4684563f0044cca9ac16d5467a42d40913f503bad8d171bf1c99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3662-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "5a02b9214bb7ca03030323835a85efd84d369ff02a6baf9193083e2b22e8d0c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "fe9e2b75babda09ba22a3e99494198e125188d9345bda2b961f10e98e6c2b784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-one-23-2330-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "374f19a62abe5b7c195038ebc945528046478ba7fac2b7b429edfaa47122e6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e94ccb36573d53127cfdf1f6d617c31ba8562fbdd4b43e48fe1fd52325315756"
}
]
},
{
"defaultStatus": "unaffected",
"product": "poweredge-c5230",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "52dbddaf0c9803e7f9dd389519b829515abe97dc0fbd9b979230de28880f595d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-alpha",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1d2c02737ba96e93892f38c161b3f35fbca79a4302e439e8405d3434ed88fdb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-5552-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "73e72a45f92daa7ef76dcf82e6d13113cd9acbd2250d78d2e02232535f83fbc5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3646-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "081c82a0748297ca5841b1772330fb6e776c678d425789a66e3072fb73d072d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3455-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2fd0f72190810fa5c4a2a3f57a7bce51dd0baa47584b59b7cba4752a92c66ee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3052-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "c4574a6a5e1e6b4f3b4a3317b51d75c3764395775f900b9ede99dca5e76849f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-3252-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "9cc04e65928cf4852d0ae16d55808b42542387ae389ebbd3e42f888638909932"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3655-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "31a7af2885146a94a82ce214a26e4dcdcfa36969aa47a7a1eaf3725fa6a2198d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3265-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7c0c8fab8b15d6de59936a3921f85d9e79f710c6c6db6459804b679d82760e26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-5755-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "19967c4eebd851b31936c8cab20f86008c7f065cf93217f6cc82350521cc640f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3656-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "a0e12007dd08b6d9a22fcc6548d0562ea3a966b2030ea9d00c739971e02b6c9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3015-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "05b03dab647098c957cadd2a66ebb1401dc5dae51f267351c0d076c239d5856b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Studio Sys UPD",
"vendor": "Formelife",
"versions": [
{
"status": "affected",
"version": "a451ed9d6359fd109f495c75bab2678285265a72be64b3e5d0d5447a0e167cd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE1 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a9638651a2475403924f124552dc199689a45d2e2e59e3dea2b223667dfb63de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AU47 M1",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "d3715136d50fc486ef59fb4aee1d7f06552fdf98423809939538fe905a1aa0b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX100 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "bfadb1d20541d4c39857e7b295b7ad20ce81d393f014eae27565bc173c1880c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX270 S2",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e44c2088ee54191192cc690787d74d8ddbfe3fc97c58fb2c42cf8a952784c94f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX420 S1 Chassis",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "c27a0e267f18a89c8ba8aadd37786ef8fe18162b60b45fc209bf992b570837af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY RX100 S7p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e71744d4e18cbee18a1fe381a8a83350487baa6cfbf3729d999f85d7b650610a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX120 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "51a9197d05b1aad84546d9469b2c400bd7536eea62b2760a308e5bf84e71d74b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad457250d51a0638880d9cf1df9dd029ab34b36265eda73c5459d8d0460ba3de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ab6af312a78886a13144814ce766a771604755f8dd303381658026304415280"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eef3fd99672410b85e6342c5757723d0d3ccecef9805237955baa20780de8b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f21b8f836105cdb4051d8bb29302dcf86836b640bf048b24f3c76e930b513b32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "62bb737d55f4caa082b7ea2aa6f8a59c8efdaf9d5ac5b158cbfb32a6cead8164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z43",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1b6ff7d60400c7c21a5b28f947475e61abee187627c1ff12cddb25b1ce59ecb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18def9ce5aa6551c1d7e77e9f53e34701f77b89d6b32d41ea050cc94d52941e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b14d2e3fadc16c97684a4ae947798bb3a67372441dd7252568f71fc86e98ae9f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z52",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "062e3100bfbe635c66feed863141f7a6f2bfcf0b887a5b3d7ae31fb610d17cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-Z12 (rev. A02)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac416150a9752dc20107bef240e73c6054af4992348003429bfd97a7373f4f27"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z61",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "340cc5c8f4468eb2d36b684dffbf139b4ac4504b5db3993c3c1b5145858c5131"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6B",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e761b6f3c7d3a1407addf499ff848c493a9d0b0197368cbe858bbc4fa5a4702"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H282-ZC0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b739af751913ea6ff42999069963dcf6a1bdd58a3de800ab721d9bdbd59bf0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ32-AR0 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a4102b19258804214beb838f61699a7623cc654341e6f60ad986dae805935c14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0a3837abd91821c4ad98687d2dc6456b7fcb05c8b672c48f242ffeabfa3e9b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7678e64f7728c059b228ddec74f0918f0544d5193f7b8efe0bf03e8f36c2f5c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "122baff0bf1243b945a7eaa9ca55303469d624d6150d4da136d697878177f1a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d318d27111a3c5a2e3a6451103750d70dec9d6e9d048f7e98fcd60066b98aee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-Z90 (rev. A00/B00/AT0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbd77ee47e4bccbb2b8af2883765641e9d7c404937da2942637fa1b4b6d4d635"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R262-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7f73261e85bdc43932e49254cb8654ed2ce0945379592cecb081d51e5834289"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z97 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "076310804e591d1c2d4ab1d53cff0866c04a4189e03e6964b528b8a94faa7991"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S252-ZC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8927ee41096d71b75bbef2672e22f640a22ae3588f4f44786fff92c70b861885"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-CE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "79700c28616b906f5534cf45d4582878a73f96eff24f1f894bd04b24c00eade8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac5ec67cafd72fd7f497c3759b0dcf359de8b7db6941120c0c69d5f3eea4bcbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bdf9b526d2e9e65f23ded60745006c65678d184a258761666d3864432cc0cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "630321979d80b22e20ca5fc713b2e3e1a8d9ec9ecaa6e2f814193ab8471636aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R243-E30-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ae9c0a6e84b0c2912eda99c2de4e95d45c0c8feb2a097e02832ae03c74796f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G191-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "28068e88e5041161f4485f958f49060d6a865e4beb0b53bafc8f3c5e5e3923b9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G241-G40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "912834981a1de06dcdd4f8cfd11e7db46ac691e5ef20616d76d859e889c303be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-2G0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dbbb711ff0879479dc30b9a7116fb94f093e0225b74916f6b79edae90d8fb2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G591-HS0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bce2bb4589e9ba8bc8029514a887f3f3bb4ded3556bb5d77dc1a38bad564b435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-G20 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "819cf98fc21e036b3ae7e6390ae09edcf6fc6c260b22bf6ede0852029ef2495b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-H61 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "190d03dff0cfed20b38ae3270c8bb197b024765963dff6b7730d96bfebcbb24c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7eab23785afd939c2abdf53e001e896c67216a6cc75b646d990fdf92ae226748"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H281-PE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f715f7b4128701de97332885c28547fe89ca4214de5af85623ab90670fdbbff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD61-SC2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98c90d7d56e82fcf28b362fbf659c3dfd3f987de96d997defe2ef2e78f33cecf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82bbbdeed52e95c3f19ad09cc8fff5ea17f9f5341fbef5f88fba478c24e9fd66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6957244c7417f2ea28889e02d23b63091b6049b82263872ec3a952765becf9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU71-SU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "67c4f4ad83e151ebe6e61092bec3153ec269e7be1945dbba0c61091a345a885e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-340 (rev. 100/200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1bea20b7f9327d743487da2db53e5fb89ace6d22f56600b58918737418e716ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aef16fc11c0f6ddca64581dc5b42b9d6e4ab66807ae7c5a30ccfd8f6774a2b18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5077c5d90bce52e6e22371dd64910f30aad69c42aaf9a144165682fffe23c3e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-G20 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2b46f65550950fb75d45f5bff54bbed8d4877d803a9688739abd47909fc5f6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x/3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a1f593c61f035734a87dddbe547a18a52d641785c40cfd320b0a0802be57a1e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-C00",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddce5a86b35fcf3fe494169bd1834b1f40f24b1a4938e5239bba011dfb981949"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-C10 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a09c15eaf24a7804b16fa6fc8e4d16c8ebbc850d070439b2c1ead835f4626dc0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z23",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b879d3be098143f10fd76db48424f3c3470ffffbe2f828ec7462bd8ec73dcf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z42 (rev. IAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b98e94dc0b78131fe59ca6a9c0a142037d412e2ce5fcdb9d0d6d10f102b1d5fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G363-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2bdfb3a454065b92210cf8a11ef836b45b1db8679d31b45e65a71d1f5efdee8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB4 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "930761233953091f36c6f92e069229f7dd6c86555c03315e1cf51f9fd349ac79"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c564d83ca92af69a296c473cf748d2a6062883164794856c8be429a652e421fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD2 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "74e19d515a7d2d4644f026bd8ea3ee5035b1d325189d9ff2184892a62a7cddc2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZX1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "637be0a8baa2b2a07788add89178c5ff71b837b0d7313d31252293e87a8c3734"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-Z10 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d2868fe9d5c6ff7e0397d929f170cc6ff006c5d1b5f7bd99d937de8f93dbcd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H233-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bcc229773a51f96a3904ab181bc621231f881b88a9f59b9427555d9bc868045"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H253-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4978fa8b487795206594ef340a6c846814e02e248aaf6d6d22e21e58c194fc00"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H273-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7d216a628dc15d65ad64ee6535a8c190260c9616945108237dab43b3fb1ed549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c185f2a4900213d87796a8f1b7ba719d3506961c3587cc6b6c39ebae2067e93"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-CP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "13b00bbbbe69eb17f726a086841770b17b9b5b02c903d165e5dcbc371b87e4d6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "140cae90bff7b80c41f0fc69c6439ec9ef3e7b54e408a29dcb9b41bcdf07bb3d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36d2df2564747908c8f8b28df00ea5504783b9308fc76899d0a5ac1b57f43361"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z35 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e276e4fdfd0ddecdf0c1df49718595d0c4bcb28850897215b88fa01c239b62d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bb0e8c4030538d2b820b333ffa1b211a7930953f30bc9ba206eb26adfa45741"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z93 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "44c75c03ddbd8689b7a5df96689d730f002367d428da0982bf089c8f6909a75e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f59fb01703b0e6cd5140683e9eb6d98c452b3acb64ab642004276daf49e1ace"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59c838f97265422664d3508ad13e370351e9f482983d942dd7fbf33bbbf00587"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z97",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "42329f479e5572eadd01b94fa8f3f3ae16b7fb4452ac2111f886855e4f52597b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. IAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b999a0a4b3a7336597e7373e3317dd29b91f5510fdfcc8323988d1edab6c23a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z12 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "920c4d1c705e8b80e94b19f2c690d1fa4f25f0f6954db6209ed5118d7927fc32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-V10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9387dfa08afff4cd1f875331c6eb24ac6758d608976603c7398c039dde35890"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "76f7ae620a91ff5e8590a2f22f59018e613aeb12b626b886d6ce2f5e4276fce9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "57be6485a091b1f60afa9a2af34cff051e293d03696c04ba578f97ac38a34d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60 (rev. AAW1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2221d582286ebe04101fc5bd7e353e3f8826c86f948defeb8ac265b8c7ceb8d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E162-220",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0c8eb9d218ca1706bd15989efc2915e792918b52cdcac38a4845913631f6cccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebf41cbd3da1701755a788922944f1ec7e13aa8396a03611cef2e3940da4cc20"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5caad5c1ff5d9518017d64a2dc8cb2a83e294520ba6460c0a1b14212688f39a4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ID0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2902ae30064150ea9236e92b819a2cf96c47ad73f0439233471b89bb04cc13a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-3C0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "436d56f15a1373c341638cc0edd950866bd519e0cb1e0de07ab7df2c59fba5d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83eeeab2bc322fa12b1ab2be69ba64ade98d999f8e1118ba1d6957c45b52a6c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC1 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "083289beeb6b2d85285084059994d0ae833833cc7284428b6eea303099d99090"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db38dafec56ac3bb8948390f699fddf5a3f3f2b33d0a696d41c803c059a5b940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB0 (rev. 1.x/2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eff883c442f1805faa24a44e645413d9c9d3d95e6e0bb5c227124f7eac8187b6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43eacbb8f8ffe499f4d0715cf6f798cd81351474abce0e410ecfeed7071740e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ede862fa7c647cdd18ab5b2cc90aeec53c35e7f2a9e8d3cc9bd4f1f4e7837b30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ffc9128e64f5a30a78f594923301a6110a8a97c236665f4d4ca7ea28d8a8d21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU72-SU0 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "776719490d81637a1604081fa3e9ea7fc975020cbb45103bbe4efc70ed69c6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c0481e584911e1758040140b89593d1839956ef379a6d45d5ac37d0666b866"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU1 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "80073632c479a5522a64e14cd9bdb4cb12c3b86eb8eee5c36f63c40c96865334"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-34A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da898f000b47ebe799f88868276a9f9a0744ae283480c70b4506f17218696a52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NA0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b851b25b7dfd2d50e710016c21c06a5aab78fcd64597ca631669b7e6344db6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75adec4e87cb200578f3899c3bd7435bbdadcc4941e5edcb5a3fe3055a8ad190"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee788077e078691ba0f587f2f9f044667b3463f794d8f38fa0c96e8b68550703"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB1 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "64c336027bad7ec398c64d31ec444c47ec0d0b60eaf89202547967cc1b21fed3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4270e08e2fca65beb36f8adaf338c4b94d248a98eb3d205d0fcf6a1cd2d6ca6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "29ed1fb8fd445c86fb30ef02e78db0b5be5213ece5edebf5f9702daaa94f5ed2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5be6bd89d0e644714c6c98502efcb6e5b90fbdf3101f82cd821d04d2fb11e60f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z34 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00089e4dbac3fcc36ba347ac7d7f9067722601a9a55c2360bf9cae439a52c010"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ea3e4c728b066bf6827adb0497ec6e32ab66c546c4ca89fca8f3113c3d74e950"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.0/1.1/1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5e55411efbcff6e593a2de57f46b6040324f35c1ed14f902333a71b6cea38930"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E251-U70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6c404dfcb9550bf9080bb679ccfba607c96b149772c345ddeab0f881fdd16f8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "84c011953dcd5981156d4d5488c82f53ee73cc839d3359004d491b0f1fbf2808"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB0 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c4dca3104af399295b160bd3ad7d01d38f9dc86e7143dceae68403480d7c19cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47da1b96a4296aa07edf9e4f54df7dc663e8c8134477ee8718319667073a5d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0f77013fe1a7795b311828614ab371df89c88dd7ddd165d17130422289838731"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5b7f646ddc82ab730c91e13b52d86d9fa3c28d0b0cd1569fcf0a9b77509d7c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-X00 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "876f82d1e8632fff9b24a04be60fb1486a1e4eefb8b20183580874680fc06150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8567d8f2fd8a32c33c81aae33ef21e34f818159199f0beed6c10dd6e2283351f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7e9eff716b9e7000c89692637c58014ee0be37d7ddd39a0c2ae4ecba82e38fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC12-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e37407821e4af774debc51d6dd492c11fe6652ebfd25febae7a603a7ef69822"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW34-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "add3e41160a5effcd5a6dbfcda45072059e02f5a6fa39042fdbf36ae8193067f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d5900b5a13292df17073793a00393ea8e60a645104ebf8d95c5407674421c76"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ecbdd2c9fdb6e9bc4f2e48b5b3e1651977a39eddc6480cc4888462636648f38"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC62-G41 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc4153ee0a3333ab789383cef8b0d9760b9f416138a093cd3357370261babf4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX33-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0e138096681313a3923eefa3bd3480e6416c73d627d3888b36ce7bb6b2b989f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9f880e1df8c0a237dd9cf607e19287817eb75f59057e8df89ade763ca7b6812"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z33 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d18f17a61f21b0b96542a3efd2a543cf87b434d86055e48aaac951f09c53e0e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X13 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3e3fbdde80c01e9755408922f67ad04834a61cb5e519ab010b151b68772a9784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B760M D2HX LITE SI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "641b9c056a8fecdc3a572db60e00f0b0fed7722fe9cf377bc4b6ee9208423107"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-7840",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f63845840d8dabf49f4a1137c4b1558257748fc26812bd693de92ed0257362ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z32 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fd571d3ff56fa697a130f06d98ae3d2568e4e3d5848cc0966f4e00617801cf2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e01af875c3100fa3d72d014aaf93417317a1a4a4e69c4a28c216c73dfa5e041f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310MSTX-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "094ba53bd3f96434153ed4c426a2c9f8b62ccab2b7ff60932061f9fa84a9309e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-CM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f5d955a2b3e33b9ba93e98d56a3ce4c997c4234161a4637aa88eda81cfc743a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ad827acb383f51e80cfd4605f8b02186b680f61ba0129e6c054af896dbe6d48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H310N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "de983965452c5d6bdbf7e4137ef30782337efded699beb2db1cb1cfab2a9cdb9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-E30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0ed7595a6c1b6e26d1e930ca3a8c1c0dd619db049ef112fa653b8bf9b026bda"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c70331be155ee7c048b0296e15de195158c1215b1ddb31fb842018467c5857d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S46 (rev. AAM1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4151a030854ddba555d497a9d2626723d662a9c81e86b39e4e2c02c209ebabbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S35 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c33896586db20586273c8378d4fd18e49a4db7b6ac15333eb67536536c40da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-S94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70ed5ca85b768ef6f9bb36baa9596d07fb259c775b457464c138a7494f7340a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-S11 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9ad9beef2a8253dc72e6bdd37d76bd54fcae482fbd3308904d87dfaa4df281e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f446b6d7d932602558e4abdbea9a9b826a12d27c535ca6c2d0bafa5e34ec3864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-S90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cee49e6b444421c55798f7ce7bf7a1eebc6d6f75319c2bcb39bd11b4075c71a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5380cc7bc3d652f0d0316dd3225fb45f1bb054e9c568b9c8e8bf9591306cdbaf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "77b27203150cbb0b885df35e361b1a193163316e3f315be4e7967312b097aedd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0c5fec105a86f8b7ffa77bd983d3ed0b54cbc65542e0ffdb9aae29cfc2ddd8e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X11 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8f28f55ed2fb648c7237e216e5c377da45e9f6d6a746605515002aaf502ae4c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z91 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1fee6620306388e1d23dba7889b858bd56a091cf04ee68db32639e14d9b87a14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "672102a1648ac9839230ff8c818edc737b01fbe92250ae0db8ae2441b257f5d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi3-1220 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39ea2372c5af03dacf3a4112895e5bb59489497c23828e38acd4b4fec35df970"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi5-1240 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d34f17d147062c8aa223fd2e528b8c10c0879e8ee2d6064607f45e93908a935"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi7-1260 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc45a2e1fd0112f5deac4678b7b093d4e233256af8e492104658c38a5ad426da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-S90 (rev. AAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "059d906408ac5c7daa81504d9e9057023d7686c9383faa48ef6f195d4b32d997"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-SB0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "394bf746dc6183441ea4d034769683c92eb999195fe6ab6e1fbf10c4cd1aed32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-S62",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d733c74eeca529ae54b842ea757213532781db14b38c9222f4eb34be5ac7e1b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-SG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35ec23b26774c9030a1deca1b66837805aa7bedd6518d5be506681f2296b5e17"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-S70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9fb2a464f53ad26c1bab90ee2437c0c265ef6d0faf419af58baca323c6156b7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a7ac0837b77d7a91edb4e5fbfde127eafe1601e858a6312af9e555646de46480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "abe7715141d75d5817b2456105d037d116c441796c7a373dbf3307412e111bf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO15-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0766c740aceae7f71543bfb22d3c757640e714e52f32a17a3d42f9d16d39383"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10 (rev. AAA1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2af044c4474abc534ec6da84e1e6415386421dbc897ed2946efe131840de8161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. B00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcff49fc24b1b8cf02fce97a15b0bc8bb19c6979df21136007c677ac3b9023c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2bf55cd3046c8fb548063466ea9eb0802c4401f3c04a13f9ef693fe7c23570ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8448a4dad1df740fb0882eb8533c40a2227e385f9f2f07a546c1d2e6020b7cbf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dc9159572d38d754e168d1290219dc558cc72e67e8fa72727ddd43a5ad187e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83d24271a7b1b9bba7070c128edcc8b4d6a5e7c96caa920baf5c014efbf6775d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z93 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "255ffd2b1161bb8a53626ad3920c40eb5f0f63cb1d5710969abf31797f8771de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "85f9cdc44ed670c411f0892b769e91567f9a81bcdeb92861fcf6e2ffc7773f9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92c197c09f8aaa2e20427f649cacd1484ef7a345040f54eeb3135745b6f671dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efc056c3caa782e178b7ade2333316ef39a0a6e17157c68a61927b3a045061e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ac696517ae7da9f3efe81af66b89b5f7b24beb6e09aca06e61e454915070a3b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.0/4.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ad038a3b127e95df1fc8fa61bafb96a113fe0093d9ecee66db9ece973c5a257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "225cea866d8c5843d32d6edc97764b69b05707e47c9537e6e6e7f4ac06775816"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12 (rev. 200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7969888310f2eceb73544fd8108eda95c1a3ea62ff57da93c643bc55b898f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d31512a9a475071b6e14a03aed7c5286aa0c622925d7a840bdee7158a7d9583c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H242-Z10 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1096dfa8e4e5f5d2410eacac73c51bd1b946bc4d2f110a44e8c33f53d0182eb5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R152-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5297e4a26fd8ed927abcb2438a5ac2a4e35e770d06d272ed77b3d847bebb11fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e81cd2760e4d5090b1d0da86309ba993256d88a4abb8065ce83266bcf4f0ca34"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40d4956a427564b83b0c1a86f1c32510feeeb5282eccfb211bd29f0a0a7767c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58a47d7e153b03ce005686aac24bfe31f405a7cc4670b826ccc775a839de7ee1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43dd7e97fc6fd1fc0ac1ef601c00eed9ec9b5d5325243fb8c6f0ae3517fce89b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b7eee5f852ce1424dfd476d8713650e528fa359f19e551b7adb9b6a12ad467e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-H80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e79fefca976e762f76a8ce36494928dc2ba039de02b69659a87b5245cb27ac2f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d04141fdfff53843c10ef247e885ad9fb62ffc58c89580718ecd2b102a590f30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca65772cdd5fef0d287957d5a6e308fa1126b9b40a2cd701e1190e852ce0bfd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-340 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ade7666d9e200c0929260025880128674b63349911f1d03857a42cf753f10b80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6917b15d532856e0c0f7cbfc3501f4d5c273616046d94695e01ce07303f6011f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G481-H80 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "53a8edb12be4b79c231d3f950e20343f20f3727a6544504259639fa6506f2457"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-H60 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56289ef76755acc7f4e843b3ee0f29ec8f063f113f640b157d095d18a866d874"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-2A0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01c95a23c9bfeff78ab2b6d77ca33e6a967cf624d1afb5fad393776c79a25920"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S251-3O0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "303797b38020f7b91381f887954f819112509c4b855ebd75c7a31dd227acf1cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S451-3R0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9a2e7d55dcf6e3f7537515d2c6cb0e36770a5fbea7a01dafe4a90359ade90eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "WRX80-SU8-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "249510667c5c37bd25d731655d7dbf18c5fc2d8d377c0c2326810cda6d9c0f46"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R292-4S0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1dcce1bfce8c75c3fdf8a307ba7f6d0231504095e1c4e6bf2166a4cf75df29cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcb8c9ec0cdddcf94852ac34e952a349af1ca970d825dc239075286875a9257d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNE3HG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed3834eedb770cbb44be9357c5b05d9800ec9577ba3eb6faa3c47460d78814ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-R12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523e9d1bf5710144e36f9535141955dcf9a3d075fff092f6b4d1e12ee2eda562"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-2807",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "16f990d85b5a42e9b762a08f69614b0c6e3f5c1236364ca38efe92a5dd729bb4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB12-CE0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcf637c0c5be2018d76681b66661d1e6f061c2e1366124f4ef8754c074f8a95c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z30 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92780ca87316f207f58c61f65bc8f702fbb2881688d9819dbe8ebbbbed6e1f67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO23-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "955038954a0d1463be658fe518b6006f9fde166b67e9007f3befb9cfa62e5da9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a462c1a73072f541b6719e4cdee351d44a7cb3593dabbc6809b5b387d909eee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "424e8b46bd3feec4aae4ec33eae1ca8658526eeb66e121adb244d3c322dd005d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR3-4300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cc12fd686928c97fa7fbfda17250579adc4e7bd11e46e88650de5ebca6ed03c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR5-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea44803e9b188161126374021e9d845136edd676d33fc80e5f9348b8d577a87"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W771-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d07d7094aa0dbdb896f8d3dceb093ea8c1d72ee0009472ece73190d2071aee6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB51-PS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "372c9a6f86f60d7cef6ae2d2ee7ca0d55df998ba0a47468668c6758b3d3db725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca8a556421eb318b0e5901085e97c448f1646a1636e34ec6e4d76f4a3d61f601"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD2 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c8ab653dc8a40406c0a8a4d71b56059a2f9b7c7ab9e883290acd071941c7bc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW22-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d369b68d0c38afedcbb0eeb82f2d06d486e9c0ce212ebe3b0d9f8dfcdbbbf5b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-4L0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78ce8406e3b09a3450d41ba11c1dae91456f25c796441dabb52c7b7e261b3a69"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW32-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0cd64d233ea4db6db2a90962d2888f4e5b967fbb24fa944ccbbfc2c02d5a358a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40234a98894a9855db1a921ffe9d272caa1e5702dcdd14afc82f6a91753fd460"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5300",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a3ab1a934f5806b5472f13257771924e3fcbaed289b2d6a860ec2fbbfd2d0c11"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5400",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "06879fa2383284b0222247992f7d359bf5d0ddcebfdcd5b42a20ee5f46a8473f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "68f88269c87ecb16f9b7d9269005ce505a3498b9e3440054742481a2254d5aea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5600",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d98134626baccb58d0d97613efeae6d504b112a4f8d8849e2599ceecf55f7fad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec439231fb2d3491a63b173bda078a128bf02b19262b3549f3a799992442d9e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7704838038c24fa47fadd54f19c5911fa39823ecfb5f451db59271112a07e777"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-4500C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43cce322b194b9be7bedb247098e8b691878f238b14199cfba11af4422b3464d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-5105",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c412ba0cc85278e93f349b9fae6011982f23f8f3a7b6539a36d90b551ae1006f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMPD-6005",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f14b4087af44921d294462fb0d65259f18af0cc23b7ab1c5b87773b9c3c13e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-10110 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6626703c5940d244a87f2967f0c54f4a5a7b53597dd92a0b561f28a2f9a9161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10510 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af98c4cea319d387751cb356a28390fa630a1b2f66920a3202b37e0acb861ade"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbe505cc1f3a4135628b7e22c7fddb99bf3ee1d46f82a84219e8cb0905c20ff2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d27437e85db58b607bc173e844b31dbfb8b949ea3c225e13377ae942572c4611"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bd110e7a5a1e1cdd77af3702309d98f748cdec6d25a5e76c04f63417e2e6a8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z50 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b2bd8851706081fb9e310e5f4a7a97c3a0bb32eb7167a609e602ba6cec1ea89"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D3P (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19c85b8fbc25322544c775c9fdcee793a563d51b32ede6b29c02248e0813f42b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1505 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f18902d7afbe8d900b6552c2d7a86760f05c4698c1018053b2fad97f6ab51f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-1115G4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6c034629c0d8df05227f4e7d85d02d8fa52d7fda0940fd4f80f62a23be06c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-1135G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "baddfacc85e4aa97915493c4f66cde6002104bfc10ecfa3839c4fc6e32597953"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-1165G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b191f4293202c488ba673c288bb5edbaf506a9835a508ec38fa705797738c918"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5013d7b2208a6c2d1ea75bbef06711be676430321f4b275140049d6fd53f8df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60d70e509fc3f7c1da701e5195218f20e297c11d2dd4f0327ea4d25732c120d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0ae28d4aca350a31f66402f4b0f46e05e4aaf77adfc813179a7df20c8f4b148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W331-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f7c60d69e3c374da221c2ab2d2393794965f2e0e1cf296f5a64d4d77299089e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5534cc441ef64739b9609ed3160f296cefda8faaae992448baedb01e9310be7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82f181dfcdb973537274d8fbf4ad83d60ba8b7315bf99def64780a8c29c6a843"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3 Pro",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "810a53fa70ab5b27f2dbe92948b79638dc87fe6015f94c41501562a47805e28f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee03798b5db2710360c33566b2e61b46bc664ff8a25b257bbfb620c332d70f2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ca7152161d4d3a65a2d4fa707a3784811bbb7507332f1c82662456f5f76b5a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 9 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14d6cfb20110768c3da503050dd9222a2514aecd0ca49f2c08e64bf6595b0cd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS MASTER",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "326280954738ecffd23930791fec6dc0ba2b9774c85886b98d33723974c3427d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "91933d348054953096135089baa7b6ca61dc43e9fc25dff45c9fb4dbf9e8d606"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "22869435dede4b52f75a6b82266b67f8930857829185f97bd322c3a72a8899e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 DESIGNARE EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0a1aa3edaeb6b389a08cded1ce036ea9178527389ca1549442a35f8b1b2bcdf6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3716034ddd789a3e8e1c688a477e4735f228bc3acfa18b63e719d7cd1e8fedfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fbe2e27bf4b4543e39c88a4702f487b15d02a47b04e006759cfb6432d82fa0b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299-WU8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d15d9bd6d7980d27bb56848643aecef336c8ff0a695e155071b7dafb1f75d08c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "826f711b5accbc542c3e33d607f1dd10edfb3486772975f204aa2de43bdb52fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0c4215e8207d397914a56edf50428f01ad3676c23630ef7b8c06cf36e45a7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcbed542b232be01a0ed2d52dcd3dddc101fafed3da9f3e3aa6b17b652e640f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G182-C20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e133210fdecf2d57cde25b0bc706437210318e37655eb22a97000bf27a02c177"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03e23d40902c4e68730e74ddadcc716f46032774001e1b6bc606c5294d4bacf8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "390cd14f2be9ff14cdcc90a9e705cc017bb2535e66b93859eddc233425998937"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G221-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e8b934cc0bd3127262a9e52fac754d64abe27c09902a78acec81c0daf883f77"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8d49dfb69b420390cf13ff8f3a3b3ab88e5dcd46a182c4ac5be9868bc6278c35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3b797002d243cbed1182569ffc6b5e5f6243e59ee27bbabae7362fa80be6e91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "24be564cb337350bd9cbf409cd95f29b760e1ff872f99b27379c40b533e9f2e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "99f913a3f88561d7163bb1ed79380dd346897e577315eef71695aeb861e82579"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-Z70 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e42a49d2674808c57b781e8b3d78613a143ba9797d1a856ccd2a62302a49520e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10710 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14c74b9b80e71d3302c13aea0dfea3560e1452a55c698c20e457c5b495154443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-10210(E)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56430f2f4f9aef4e50f503dc8397fdb20b005bf38a8b9029c43e3eed56c39229"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bacd1c945c9ff1ecea3e29039ad8b742c6d040e5792bb45008c1b7f664fb36bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z46",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "31aa7ba19f6edb9472a3da22793803c265a0cb0b7cd7979db56251c37edcfe5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z90 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8cc6129ba23848fbd65b91a9b70999aad19d3b7a6d168066cbe4a0b759fc5a5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z96 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "605db3a5cf91d915929488803446e5a51dda16d661e76840b707474d2df79069"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9b0c2aaaef88b38db18e4efd44b2582c8401f9a17f2c54d0e1f07d2c94a9a5f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fb07e319cf6d523a488d879e7eeef3321e90fbee049efb642b34ad2a32611b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25555956322c0eaecf58fd759ed9b0b7857f9dd149b02de55e2f5eedb291117b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W281-G40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f7c504d3d3907aa4c7f70ca1fbe1fed7e73426eb987b9c5e2f6b31d42e801af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW51-HP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1190d15905ff8656d2d0601c388df633b1646fd585de4fe871fdf93fc23d35a0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z53",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f61e3f93c7f6615cfdc26efce6a83b3188d697e2243643d08d10dfa9de8afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0fe0c762e396660fb30aeddcf5a5928af864eb44399271ed975913f36e46190e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4570R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3353c109a69e6fdd86adbec899e2669cce724bc35db33a86fb0bf1c81a508c2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621 AORUS XTREME (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7edc3eecb5d5ed515e06f8130d875fcae07cb0c7bfaa2e4cd8d86862e5ecc256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MJ11-EC0 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3631995d059e336863527f1511894bdfc61361bc0691a430b3896fb94746aded"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E6010N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9c8f182cf3b058d12bddb039d8a3f3686d1c325c9b2719ec5fc8644e066274a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2da499751e8a5446ac8445cee5b95f6bf75ded5c8ec6738eb67f5c4ac2081c32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6d6107f0d094fab41eaf6073089de8a0b24bb7a66c5851f534a8f1d26812c3d2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "edd3eccfbbc2ef2ac40e723697f67a346fca062ddd6679c5ff8cfbb91d3b6afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "575fc48c70ea9ee40f8016ea2328ebe790e7e556333a95b9b511be466047f668"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-T60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b636c9fc0ec84737f2238365e71c23e9227695cd5ad52bf40dbe8290920fb60"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7HT-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e9bc71596a97741893377b2c52a13b5b2ff0a7b6f985af40725e0755d2c537c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SD8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6ad23c1fab3f0a2babb23e7907385e25a06801c2edd50d108e5b08f923855a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SU8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9017e90f6c47a9d9560cfd92206c4b2e624cd91cd7f0680fb75dd972ef9582d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1605 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d72f64d5a25b9088f7fff456d3783c2fb0e7926cd4de6469c6c3f57690830907"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming G1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0455dd8b57341d5667d4c4dd71767321c3f72770f84db4e46f93d31e50b376a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0215ce75b3629651d0c64b0b241095b58f0af921cec3022c524d531c22f1385e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f528dbe55aba35bd4e5d55fe853afed41c54d78719765944a5ea74dbc062f4b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc7b733f36b027823b3f501864d74397d308f8bc169149cca5307855234a4527"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D3V (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19b4ba1388707838d0de17b6f2e9ce01f70f728926ab7e2dcc0566f6dbce8e90"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G211-H4G",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9546a8c62b6d285172acc0ca17340040cd18ff76bfe5b9e7672824e948f7331f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW21-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60370916ce5edea7899125ad1b470d59cc04b0aeccea1ae5474f78ccf187e4ae"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW31-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a89940e207a6fdd61170536d0d8fe66b4584c38a804c0df15d23c0cf30d49e35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-340",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d2565f697c692df559b665d0b97b3743c9de07c0ffa83b0fbb5b86aa821e8622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-X30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ca3df4ff24732338397d64dc81509ea5a7c4b979ca3f2ee6c7446d690355c52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W131-X30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fb3aff9b87102cb3535bd80904b7252c40ba4f556d9f355a45fc9003cb29e9d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z42 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "09d1d8dff99b19615f14413d6ba20891819d481b12667452786510209344095e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G180-G00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e32576a5522533c1914ea8aed13f238022bf60eb6fb86ec5393bc8ee56cf5a06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cbb6d5a01124074eda2161e53a5128e0d0d8eedaffa55b14c1dfdd6fbc5a067d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bef72cba124fcef35a3ccd67b94707f20c2bfe2a4f4d89f3497affd72b8c2a73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G50 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9424cd10408253ab228dc2125524340f5ca53759e3ad4e996e7cf0320f41884f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G51 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c17b5d0b9140f95f5317619866739be362765e6165292cb183f539b6758f34b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H230-R4C (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59a3fe40e2896be666fd2712f7e5176ab10ca9335b39bd04fa48867ee607c066"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4fc77114a472bf1902a66a35f51a11689446c8d0dc18000717a5f74ae6b3a2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-R4O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5cda726ef82b73f9c764e39a64ceab32e4d6e238c3019e06d3b7f2218d68ea8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-F4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "934742dd01634ef45d78c2a7f9f3e89a0db2cbc7baf994570cd8b64fa4491da0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-H70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "499d17336ee9e6be59a733507c25f7b343933bd728f296f6ef08af611d0a8ae2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD30-RS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b9ef069c1c67a9caa29f8eaa915605cd0bbf1edb735d92abf2c4e959ca4a726"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "473033483d404754621122afe34dc8f8f47432bde116cfdde03ac38fdf2fb054"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7213c438e3f07e82dff82a5b6cdeb5f80e8b82ce6e12fc377732a8df2c527bfc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB1 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7540b3951f0ddc6c1c1f4eaf062525f55a1c6e862022e4a545530895510d772a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0db641b3a89e75061d6af75e41e365cab69a819f6880d4bd0a0f4ea7960fa17e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "15f2bdadf43e6d3731df0693552d4aa4780ed958dcbe0ea4ef80bc27510cdc85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "298d5755fa084d9268d09063222030993755cee31f9fe5429323b830c8c3f5cb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU70-SU0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b5caac23e6866a9bbfd7962a5557ddc9b0369cdce09b664910b35bd66e690cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW50-SV0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cde8f07d2e7d14233748df612e113ce348140090694b96c407053fe4e6e1690b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW70-3S0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c314404f2801dc3b04cce95fa27a97f58459f9d70c8e3b03bbfd45bbaf5e40"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R180-F28 (rev. 152)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5d3bf4c8452e70a4ee31e25cfd555694af3cf64eda965fade0b21e8a262a2c10"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R260-R3C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e6bc9c983e21a0cfcb2d86a9dc88c28e5ba33387acdff81bccd6caf780e4619c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-R3C (rev. 143)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b6d0ebe479ce082420f5412fc099860ab825450e58d96a6b33c5013ea061864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R280-G2O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efaf5f327a471776f0a75a2b8b7f963c8ab72190be7f606d51a0c04715dafe70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D120-C20 (rev. 230)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cef953fd8883203ef326a6b195a90328ae31ddc10736afa171b617a906fab77e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G150-B10 (rev. 111)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe702d3ce5fdade4ab194ec43fcf6f0a070123ab547ae49b9cbaec33c474dfb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z51 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4dcab1a378bb4cc541f210917c563b95dd678e185b4d0dc8483b175cbf9097ad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB10-DS0 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3aa61cde7b1886fab7e60e077bdb39d0a94e3c451593d13e87306b88b4e56a80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZAPLAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cd755796109542b3da08826c56951102e5034c76428138d1a6dd4f1ca29955a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b22a7a1693d8cb2deb608f8e3ab366f5eea0e6bdef6ddb03a86d599fb2efdd48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350C (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a42535bbb37725951ac18b0fa9b5771454ce707bcdbeacb8120d0aa0eee0cf1b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03662e2e512cfe18afe431d968d60e944af5f7514f840754864ee4cd97990130"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47b54ae65d44b227a3bab252fcd465df6e6d4875cf2511f1261f1c8e5b196e1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EACE-3450",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "421dfe54ac2554e627762ea96f454f95f7232f3f238dc9f5d5fc96bbf284fbac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EAPD-4200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6009503816a44e0d4fa7d0d74ac7418b6551e31e58bab97390711055449e52d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb4e9aa8b2416ed2fb7593a3c93d5fed07d24d1f349761a1790deb97778a565c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "93d6ae2ede6573f018ca1dccc5b686a0461a0d662a353511a0b420a10935267d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W42G-P08R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0d6176199b56171ec12bd663025c664b2bf3f8b844bc90edc8dbc3cc062871d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MA10-ST0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00f354e79abadfb8b4aea11bb07c3ddc16f00b3055ec8c221ad4d69538bdeffd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11HI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2fdb64f2007196150cda167f3eb121cedba80d75d0b79def30c4d7155ea0b2a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi7-1070-NK (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d274a7eb05cebe468e07b2e6692a11c90f222d18077b3d058fc02b464046265"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S12-P04R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25b628eb776a57d9fa45cffb00f8f3347cb9d7c2f3c33712348b85c3ecad2d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R272-Z30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fbf652a641fc3d847c148abb65130f7eece7a51a9c6607f1c403a8bbdde6ce48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-1050Ti (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0c57eb7255f99412b62429f165eeb1f8a297c26a13eb6d7ddbee91e32dbce6c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi5K (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f37453e390737ec297686b784da5aad11acbaf8375d377fac533caee996c1d66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R160-S34",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "898a0ddce89b59e6993ea651b0a0d4b54752957b63274dda75160674fa0928f6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-T90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c02c66a7d393e7bd8cf757197bbc6bc22fd9f9b38a8a1068166eba97bc5b4a29"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11BM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "410a0aebc3826f029ee6a4cd0c5816eb0676fe99a0b112e8ce55e8b2f3b49e6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11JI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05cb527ef122bbe9ebe54d4678686e6a21b961f16392841f5f0b0bc3882a184e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11KI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "945d5b0e567bf5604ea9b12fc7f3f3bb12ccfb1935b9de78c9bc77241632fc9b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11TI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7796142d4d8a09c6f416d5b3cd452caa659cfca40992683d7f8af55cf4e6a7c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFH27AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4d3a05e1006e9d5a1045ea65277cc4fba148ab4533ccb1b6d52ffe54edc7fffc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4105N H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d1879acf606abac026703a7fe242feb538192ec6f01642ca33ba6d6de55a725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc5aa15ece1e486f4b7d31c5ba6d45382204c115e556a6412d751e25703a4a7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-8250",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3584936b2dad0ff3ee3d6b167442d39dce8400e1016267462827ff20d15dcdf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-SBC4100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "873e676d25545b3d6e133a2c85cedd5a4627a11f67513e54e6a99e812e7618cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-8550 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "591b486bba979b64d20fc90bd63a5991b7df16b5aab1447de888e3d6090f1086"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5A-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e13105b80056966dee303194e6eb7e2f622dccb80f5fc5780100197d43b871ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7A-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "002c5c88a393a9da6b48c30d64bd702f6b50fef07c32f45b7c09f40fe2f3f2c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG6-1060",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "289cffe9f81f1e9a9cd087bc529701a9343084e499684caf4d34bfe8db15f3f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-1050Ti",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d8b09f7fdf906dff7d92049fa20921927f3cfebf564455eac78ce2518ad03a1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG6-1060 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3835eeda7653120a02ce98ea98ba75ebce53ac1efabe3b81d0b6dcc9e611d1ac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi3A-7100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5697a205b0e85c8f31e3538135e32b72ca60d1652162c30007d94ad079096fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3A-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f7481194b1e0a153551fbc9e68fef59f463882e3fc0238673ed6293715366c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3M-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1cc2040975c62eabeae3df92e63b2c1a22c690a97edcea1576f83e975355db4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47a969af17efdfe04690233319d36d12ff820901d0817ce17846281e7d5f49ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT2-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0aa384720b8e5c0d09b9b0b14cf14a105e4b607681f778bcaa202412e666bdf1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f61c63e919c797c1faae135458e0db89f288a1d05402380823562f34452806be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT2-7500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb0603d8ecac9baf7de500500990ad0a7e9068dfee69f296d62de549f69f9b1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-8130",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a74d2353acccf98743271fd296b2bf6f1e047cca1fcaccc2fd9095a7f72fba2d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iTXL-Q170A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa7e7ca9fd48d608094d5f56ad6f0166db7be91862666abbb6fa631055b98f5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6600 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6504f61ce57f6caae37cc7c56910267d18a1db46e6681178b6807f0e26ab966c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5HT-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e649eb460cc049ddac440fe93528336fa42bdd9cd7a284ad9a2481647b57e75a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b772a8c72de61e4821a04793a16c8dc8ff7b354fa2a0bff189d879df254c9f1e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7QG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f4426a3de06ca8015af5798b631afe601a78a069be9e70fc818222d9b4f679cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2H (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee21f7397347f3b42d5229b41f9d9a6b4be739419f6f2bef1c3eec8f5d3a17e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "66ff6219a24fb3662b7b3d4fb1fb7937649dcf052cea4364d4c9b178735807f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7H-6500-LA-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e23a81c581d5e6c351c2cac1a944ef5759271739f6150c3ef6857bfe401ae62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB4100TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5abc359c698cd90030a597105c4ef899e4ef56271b9e0f43c843408b9fb53d33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cf2df7d9f1ff5f087021f7b47cef6aa3efb47cbfd639f730512bc630e0c91f81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210688036c5ecadc5d764691d511e738ff32146bc69f26601fd45321c65b0c7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCE-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "327e84e3cfce4cb086435232d033a20ebcd4b95cd5aa4b85cb92206f44507170"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCEA-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e166fd67041801b0481c69bc271ae73e0657f1078442b5740b09f6774128e01"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6662b3f0d921aaee11ecae2893271fe861524620b05540e255d1e364aa65abb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030031c6c1b9422a56ed44f04efa2ec84fc8a2de254f24d14989934f613d12b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSI3H-6100-ZA-IWUS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6399b690346ae7ceda0f8dafbca5acd17ac4d796619568a51cc8e50f5b630b42"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3A-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7049738618fc298adb3099074b3419bcf553f0e54acd9ada2d611fe64925026"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "044e3800c05a232d4a8821edc28aae7927474c8814a385f717010ef9b12a5622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d86ef77e6d28671ef838b314840a4ff9237798c058244805b3b3bc01010db097"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ca806b8be055f9b5df84871c469279930b34b89de515068b1cb30bfa9c3cae0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5H-6200-B2-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40f56a09ded19979902613399e9d6c84cee02b72b7114cabac53629fe2c068be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cb60622a0063c6d261c5693fd423d7fa44d826e8250812f50c7b9a28921712c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c754aa67ba523b595de11270897af05dc22907a4fce3f4880bb372b1e18d9164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19a209b004631abf16b5f6abdbe22b3e9578e1f5ffc4bb94b6601fb612ae47f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-7PXSL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "663977d4a882f59c8a8791d427ef4431ca63f89ed5683a4cb6d61006f1b1c8d5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4260703c9695e6975438598d85f4046bd34a1f16f77fe797b22cb45b4428f83c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e5ddbae819b82a8237740cccc23cee00844fa79a15e18e6187854b29e7e81a2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 7 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b767595393d045e4adb4225856611b3a51848a17495666be273823220a0dd165"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming G1 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3e85abb0959e87075f3a91e0048163e92c1831edf3c70a4d85f6ebbe5d56cfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Phoenix SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe510a8d06c948ca3e699a51d8f60bc0411df8056124d5e4a993cd526da8a0a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Champion",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a85cfd3acbec43f545c8586b63aa52622d9fd00303bf80ff3890012032699ea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "95eddffa23bfc032d7d65b730d49a4d87bdaa93e349fd9e30dde6a450b9a9bff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD5 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b023bf42423988805835e5b7c48af57c0b487c7308cfaf5a7a0ff75e3ae8cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD7 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f93b61306682c563bb68ecb67dea64f9d5b86a8e1c7cfa7fb2b4ea02a15146e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Ultra Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "90818dd14d621360badea1463f975a367952e2a0d43e7dc73401a7ab0a2d3a1f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b8e6db2e08d8cf93dcd44adf437d6a6fabfa7b309702b35f7ddd4c1790734c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Designare EX",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "71337bea704f642aad176d64c9f64fdcdb9f38f8107294a417c9bce7a104cdd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0307e5ffce3a9981334d7eb19b13caeed61ab8074212943438b4a423b5d2a9b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Force",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "678f05bab483e1cb9cc2cd51415c920bb4307b31ff917dc46cc44c6c2083b5bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "295417e80fba51a322a02a7e4c35ab04af54a48355711066339743e88e3922f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51c5cd38074336d75c166ad86a2df881b53b4fed849b538e3281d1bcf0502094"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "27abdc6ac0e50d6d6ca0e937c0a7ab1efe8d2c53c46532b68f0cb1a5fb955517"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3160",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cd9ea2490848b03659e0e7dd7871ac815c54080e5588a530afe35cfc1ed585e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N-GSM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01b2fa505a7a377587ea64b20e1a1570eb7f6567a9204ec972ae478998236a0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MVBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "86a0a4b3efcbc51e14a0a307a0efe343c7a7e3e2bae3a6e0502869f610034ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "073a6246ab57b038afd9050e2dd017aefdde6dfad5d61b80bb2d5c3c71134b73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "be9c2feced70f810a5d08ec03dd8e7df75f9abd066a2ee30ad82136f355ceaf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "305b23937168ebedc60ac6756010c07e4588c48e9fe4694fb935945dbf4be6ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ab2b4adb933a22cc5b3b3739e315a68c9a9a3dca20b1ae7f27713c0279f6670"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYVA (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f96a77ebf7806cc05507582f25810237aeaea30ef819dbe90ab2227f8a36ce8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bc76dc04271ff2014eaab3560bbe3177cc08eb3337f4f512c7d44b98a40d1d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "713c6e95151ae02f075d0391a12e47fa2aaeed199379377bddc00590ceda1795"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b66a10f650f73f5497b22a2d45d9c0bf4df9a987668c4d617e62925c5c26c388"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "447d66dd22c3af2bbdeea4b2a766cb3fa4442466d0c02d62647de9f3683cd6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a04064b45ec7d0c5b6ae123d779095e23315e6ac1a150d4b3190909a2237603b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b1276f7ad8788d3db650a672e6ce6785d5c3922d2bc5aae554ad1b48b62dec5d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PLUS WS",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ba7690791f1adeaa12e45dc9adca1ee7f08c99bf5f1c51961c6975d1cd14770"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efb150fe9825a88101d934fb5a9801f970f6e734e758344062d37152e8baa1af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f374f38948ddbde29b9673cd70ce05e27af9f3be23a7bc086f37f35a68ede4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec7f01320c848a88e89d3db821f462448f62e5ae65fb4fd02dc3a5602ad1eac0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "577535df524a000747a1e15828af3de0cfe6865b0b20170d024974d6b5b81160"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901396591f3682b308f9cfa279cf1a7f8d4cc6622a9ca799e6b5e1d5bf769f2e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6a24bb276e5c9b05ac4cca0da01e1b381245a0d217efb5190543de6ec41b2505"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-WW",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b565acd86a3f4e294d606bf6c0e42eedc4b7361f4adf7c31ee4a806b54767cfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c544cd0b03384834b08b784ec0339e2b91a129ee56e7f4881101a10af567e6a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8b02d988ee00fe78039974032b856c56e741a4594744b4f6376cbe1df8271226"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBSWAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "41bbe9daa5808a1c5b9836a654d6c6d312ed7034c304f963af28d13eaad84340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-M.2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18216a9c0fedbfa3a8c8cb3380845ff086beaec130296234d58d02d24fe051a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210d858cd9ce7dbb1b76277fd580e1c71214d1f7ceff46788efda64e817fa95e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c80df47ed107f7ea4eca4e15a55fce37f1578b985ed45131b8c67dce9ac2bdad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110MSTX-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "55099b8c517078f75299dc02afe1f09167bcd7760c0f46546cf4f8274b54c465"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5fa2136e6ebb55d5aa3c0bcee64bcf4506a7854ca10fb5a43b8141ff4bf1275"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PLUS WS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0bd8853cb934be142b7edb2ef31a2031fb348a6ecea1db37e466dce25bf7fd6a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a08c05bf56e1c4e4d180d69266bbcb244e7e2f85259d86c05bfcf5593cfa33f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P-IN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98372c6dea313b0660ae2f1b1c80a8a5d7e93ce07010621392faca75818c0fe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af4026ab4defc142e75d57ae35e7ef4492fac8ab6c0cc55c6de47f3e21f5ac24"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2PH (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2977acab6438edeb2af8a4e3d0c353fd89e9b2d47082b528c3c23fbddbdcbe3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464be29c2ee1a3f706063374be13365d0a296776aed73fd0c8506f1cdddb568a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D2P (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f89741fdf7f21d8670407a4b8038e75319d73486009e08a795632e94fa27df82"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5641071fccfc0169979343e131d614caa71a2b334ffa45d1ee10817ccef73d8a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed85051f384bd7694f0a86322c705f819cc18a0ced71d4e3c3946b37d4f3abe7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c0e4341f91bcedf78c301778d52492fa304380cdd15bdda725910cc6709e033"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LISL (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9a8e636b33372a34e9719b8b20d2073bc56f549b64e5af83fe617187a51b97c1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99P-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa52c6150c49a84699bec9739b84f5a2c073f4f69b1bc84028f3b2cb15b2167f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper B7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92311971e888a24238c48086febf47b2d0820856e514dd6308575291b6de4e48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6051ccb31aaab7240147a1fdf9b8f444c7ee4bde73ffb4baca63b02bc77dea81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper Z170 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3df7b53ef2284dd2f3385aaa589f87f2e3fadc93d2755e28781452a273d999ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "878450f31de9dd84201895e81547ada2085ec94608d7fb6bdf84d73dc3b98538"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d1d3adca998106090f4b2f08d6c50769e88e944ed640518d23f8865102c2ec0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4cec11820244f485baa7f61d50e60a514b0c5aedb87d1a26cd6b6fb153fdf9ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fdedaff9a18229027689f23bef37cd8424e248412137bbf710fb6163eac6ac43"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da480d23fe57a6003e41f8c88e2aacbade99186f0b62ba4561663b346e9f96e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fd1eb03f29343e1ba70dce50264a7143129fe60bde396f6e3715330623db8de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f2da89fe72acf6892b139fd4f7a047c30eea75cf5c572da6f901511658ae1522"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3148d78c2efd368e986a43b19e209f2ad4817e8a4ef41bb79c57ec7b9dc09f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "086d80a421ed4cc907120e6c96117c3b69b9edaf2ef6951fde7d3dbe6ea4c878"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e69ba3bdca3335f01b749abb84c702f6f926eab3e4d6ca70dd5ab84c3aee24a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "639cd1a8d45af689d2fe1aea44b62d2110146b314f39be8a5d472e412842e61c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "94a5124370c2d66b38a568b3d8be4a98dd8d2e25313b68506f7753c4d60be97e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "825b4bc9bf807631611cd33434d1455bca3d412b9a03463fdd1092c54d5ebbfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "12886ede3cef3c93c4602ff26519a04c9143e903b103006ca3805c3df2744c8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix-WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "330f761ad2d43d72a4a09776d76bdffdfdd88d4ddf6002e0056e2826828372ab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fddafb4af375516cb2f72c9308852c88738a66d57af9deb08e9a10f1dc983499"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 TPM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ecd2f653fab0c6dc0ed24c68a8f04c454cf8dea68b58d149e9d79758aac2c54"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f71a5cfc0646d85af2847e6816752e81f3b4d2a3ea5fa94516aed9464eaa4024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a402dd098614ebc89fe70642661c52da9ed9ba0b21627cff4868defc97db0274"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e24220caffd6ba7c7e1835f12740073a9e3a826a1ffb9bca210756c224eb99a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7802bf1fde1f8771ff7165acab0474471598a46df398d7db84adf911d2d37260"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b0a77259b2af63a9704b094688237ff3c29fac1c011a373a0f2537a8a543d1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b73d5f184db4524883fae5f01e681f52371964740bd6fa957998ab4d65537732"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebd6b43db01ccccaffc4a08182e03cf6633d5371aa69c82f7300141277fe7d7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "756777ea660defef2629b8802bcbdd29b61020fa8ae8cb07045a7d5f991f3508"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-E",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "879f28f51c3b235744352f0808b6267258131f2594f3ff85a6938401e73eb9da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50f77912004b73bade539e1c3983a7ab78984b8590a64d3e030ade4352c49eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4a209b19361c13d7a18fa41d8a257a22f6c806bd62f04dd24cd77abd7d3134f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e1be66c511bc8367a2b1ab41a3ca60cfe46648bcab2d5f1f5bdf5df14de1c05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Designare (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea3c21e1aadbadfc2e9ac0860d94eb87e6590ab37f98326e00b9615a13a6208"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2cb69c081c6413077fd076d7230ff816931ae65bbead2f94f0b12d33e1861c9e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eacba20ef05b116d70c6344a54486bb7c23a131d7c897f5399b9a084a5bd5205"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "38643b383b7d51cc53298693e108cc293779dc43f254b2e2b17f66a80f9e4175"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3cb86dfc649346ea7ed4c8ff117ca91b59435b9baa9bdd8e6f2bde1dc1b1124"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60a230b0a5722bfbb364b6d64ae3e1b1cccb6161bbd6f8cc034977f4d283b4f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c6801b8a7920939facfa379b6141016651601971156e426db947ca40b6f1708"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-DS3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9ea15324d90a1b750cfcbf964321370a56b116b44a0cbee2035cf11ffcc0ef8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78bff3425a6b42b846508850f03a040c22c43566947ac1d039b431fb80a31451"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03299dee42886b0856629da99bce9cedee322b80bfbb89aa6943913d2da15e03"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523817566d04fde3f7fc0215b4c4758243319affa5c1819e4f041c290a36970f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-Gaming K3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db4668c191b9266a2afbf974c348885a9d10a3e1750d1e100418aaa896a5a103"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bf0aac3f13b0d68c6a255735eaed4000c7e5f09748818746b4a1038f0be34f78"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bceea4f950f07347b40c579223456984c0515a2cc94c4cedbbea3c17e1c459eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "20607b0f670b297b45523730d2204e46603cb3c65f47e6cf8293b07b7b1178ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a34cb81eac53b0800c2c02d2984c0960c0d68a22707869befd4af3996be42e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fc0eb68179f1363c19896c7cc043021a57cd45a3492187829b329474c361722a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170MX-Gaming 5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b87e20d143fef2fc32233444070130834ce5dbbffe06409cb537e59c911f49cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "209045f2bba172fb91679d4319cfe548c24921f1e28dd9f887e3a78bce515e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d67b82421d81df8f3d64966609e3c963be6d0dbd87df531ba5f3ef0bd61e5353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Designare",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c061fffcfd8d7e38afb97fb434afc78d39d22bf9b02884c7c1b04487cbb7dea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b1cb9593c0c1890a7f1e922777c206012f2f1ded7b3339d66fa49efaca44c74"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "438bf66c9433bfe1ba92452f5f7eb1d46cbdf9af9ab3c3d1d4354e902fb0f257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 6",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25917f5dcd5f5a4c2daaa9fc0cdf991b365e226856202b4e5e987d406e6af95b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75468e84df86d3133927f5c08028dfb6dce55168c99ec9fde08397f5ab0865ce"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming GT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d40ec6b83d08a885cb576844e609105e15fdc4e48181dbc861e2bce0b657b59"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-SOC FORCE",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5c25f790a4eb79b4ad3c4ceae05329c0878337257a6e31c276ff7aa5c18accc4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6389e5f47ee85c43b2d9aebef2e0c8a9f06856fabb148496a8acf251cdb3c1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 Ultra (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a01bb5e701b3b847766d027e7b9bed8e7bb05403ca0160734bc73c93fb77b6fc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "260811f239a5a92f4a894f52c5b7218faa75c5765e3db17a4ee33530bbfc1295"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad921f429c443cd2a73ba3373fb6407a81b4b8d53b3fd5cbea07ca847ddc75c9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464643065d45eeb1c2566dcce90bd868313319547c91d46e3cea78126109d374"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170XP-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32d8482434dfaae6405eca2bf724939194c8740da638c9e3e8b760489b2a1128"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-1900",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b0b62e4ea23df186b7bbf0fff342ec107596e1fd249721eea75375982054535"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e03efb41e61ac04cb14a63c5ee5a71d3deeddb29426e38eab1c68946d60e26a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4005N D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bae6e219e1ed8e8164382c4f05db847386c5f2908fb2fa453066aed4531310b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aecee44ca1c8bd43d65abeafcd5f0085e1165d42baa953808d566005189746a9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050M-D3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d4c55cc53de9adaaacd9e70527becc4de1cb0b39a605791601fefcd0156ced4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c717a5d6b61b22bd458dbb497dc5abad9e30fedb668810e558a46f994a656435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "63cd7d4698c89b720c73125900f4cba4b8b1c2b962064280a93dc9ce2a0e9549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c4cf96a2ce5bae121b0594c2b41664510cffcdfc4001072f2275964c20fe12e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4685e5a58d4cf84102460110a5fad72931b1b46eb9f71650811832f80580bc0c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0474259effceedf7aedde543afa096fdcca74d9865eac223b6a91b4ed922310"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f53230a65454b8805179f246ac3c8b36bd274ae0051d900cd04890e7b765555"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ba0474e2bdeb945adf9a819854cde336f3cca848e1ac41e381aaf03d397c7d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PRO ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6ed04464891a4cdc3a25ba34d3cd44599bd118ed953c68c8b63f11be2dc83d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PRO ECC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "764d56cd4e5b88fa97313d5eef173bb426aa27aef5d81794eaf5b9c1fdf38375"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X170-EXTREME ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35f6ab275afa77bb30a5672f32b196d8c76208e48500d7f381e05f8f12e400e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bbb58a67574c989b095f38c9fe031cadd5a709235d6e0bfc9a206f98fd5318f0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-9SISL (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "493437a68a7a7b46b645d46660e17c3b6599eee86cd06f592683e56963cf9a8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-S (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "554e7be483afb47c81760179da5199ebe2f59a97b7146e50ed42f35728df9c5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MX-UD2H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bbd2f88bf68b66e974356e0e49f63b83fdeea8d148da445e24073d8012c0c3a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3P-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b7981e34bc8994973c48a18ac01d6b075f092de47d35fc62fffdc503ecf081ed"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-30 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "485b963baebaf9e0d0d3f0438da8fc3a5e74cac6fc7781e732df5ad0a3be3eec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2PV (rev. 2.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e2baeb611484b3c3460fbabe2b48ad91111e9a0cd7d1f189ab2d0438a69b3dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4770R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "73f5c64009c9b8ce26c13399584a65b73b3b5201475b04dd9621f5433ef959da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R130-134",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "923e61ed9ecf1c37848cbe56822ce753f455fddf25c1eca816f3ac04aa46daa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-D70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d5844b2dc05f8374705493e1d67700d0421f63c27ea10070c60f1871dcf540c6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P15F R5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e112ae0d90739fa839e6e29687412b5669a2f23bbe2b418d96b65ead135ec349"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-20-3060-32G (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e0251d4518373ebab7aa1dc037d732b5c04e92306e16a8e8ca1479df0a9ae88"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MP30-AR1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "586ca26deb275734620c0b80c8d16dd86538bff6116f5d7db1fc10230d775eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b5b834775e9fa3cb50db4d25d9df7849cf0f13011a209fc53c51245aa963856"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "984e1178ed45439578fc0b3cc2787cc8f972987c087fc5b4762ef5f421cf5782"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "240c0e6220a07f27d4debd867f2a1774a50be1b37c3f53a2dab272a71280af4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "10cef05010197e635c330548e99ad98827223f0c8eada8a6e5a95ac7dc2880fa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9387c8f1b5d856bdf0ce43c88413c22f98214768708183bc610381363dd269d8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-3825 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6775386a28b32b93d1853880a8ccf1b916a3bedaf7ba4d34f2a64904de792417"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d11d8f85507e54952adcfbb82d5d58ecfeec7674b756ba62c8e1316d9a1500de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G210-H4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dd75c90a2a81a34fee2c17a6e72b8ec2c93120fbd98c437c4648ac5fd78b6af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSQ77DI (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030615cdc1d2e52fe185f8fa8e6e1c1028beca283a6be9215482a39df1418622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcac97ed60b61b1991fc9f499fb3bf0e8594d49d102e76a988ea8933d099d396"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M9M3XAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3295cec309f0649ecec6952824abfad776ecc1f46199a080932b5e99ac206b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-3205",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a080c1d64fb844389bad75a733e3b4c5483b07623276b114575d5cba32170869"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-5500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14dca67fdba7b20c48d3c16446db2a648c79e5f94712afba6e720ecf04ba5223"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B85TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d817d05c86c92a00f00e286c6c26cc52e6a50019970a71d98aa07c53d9690c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H81TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ebbac1eb55e763bd4efa47f6232ecbcc62d73645c3291e00a3d5cd880898ebb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e555305c3219cca7d7b8d5a667ae2ef454aca7eb84341f07e1fa8288cdb38359"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f237b90cd70e0f63c0414262a0af2fbf8456ea78252750ccc6ef7fe59cb8774"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-5010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc4bcea45075ba867a4aadd97494ddcbbe693b23131bb52703d3c42b41340719"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-5200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39b90d14141556595814f43afeb015cc34e75acc31d23b0c505ba00d1c4a6a7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MATMH81 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dea93336a790f6ce8a80f451d1dc454eaf29b034a38a802140937b3166c4d450"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZJ19AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51ebb3341dae5033164b3b45470115f49f327e5dae5ab111df2a59bc04afad8f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H97TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "882fa77c019e12dc61165308318657941c1b15c1259213e78aa035017fd50445"
}
]
},
{
"defaultStatus": "unaffected",
"product": "U21M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fb97ce4f81eb4d83364b9377cf654a6f0e8d9271bd8e1e9f45f78b07f838172"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXPi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8a4342c4bacccf07bdaf52b9cfadc8789c37092ccc0c414e1848e4d0317d01b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-J1900 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddff03dbd491004d20587de561e976bc8b5b5366723b51d3f59dfd1892b9dc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-TCV2A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70c80b940abbafb0d631870322b5f7c8e306a2063097493ab471f0ba8ddd228b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MQHUDVI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "092c46188af77b69b4c19e349712a23244ec7cdc885c2e0150a8209c1693c95a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-4550U (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3d7862eb46bcec3f0eecb5ec94caa94456def40792a125cb9b7912625be5973"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-2955 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "161c97b5c0ce6cc90a70034d8de30b18d07c43e50d5566c1802dadc967cb05eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05001b41f2adc9d6c008f12f9d1d9669225a2366c9a05f6bd19d420cd5b13fc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6b51ad77bb7963ec455923fa731323ceb72af167a0a40b8c2b91696301bae1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19e2a33d2a28a825fb89e7dfda9609776110876b204c5ff760edf716cc7c390b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "faa729af295c234dfcfc5ac4ab91c8c255c1b054c612b9cbda1fce33f88b4d51"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G3-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "718662066149651d1b7506c7582df2252c555428481b1821829b4db25e2a836e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7G3-760",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7452bdc99e762f3b54571e03c1b6ab0873529b798275149fe0a8bc057929f8c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3448017b88b33e3949d6c18876be32e506d827f65de6c425ebf82f33a2c3f502"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eb08694cb68b19cc7bd0bc323a46e8ce6de5036078a61dc8827ee480269c88eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d7f1a6c78df7317f866866e74e881d91485ef816e492fdf2a6fa02b940629494"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0e7e5b4689bf7e81db1b56185b2a1186d31a50f1cfd1c9863a0746f490ebf3f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSV (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc9b6fc8540a6abe60b8966ae6c4217180cabbb3471d12f93e3c81dc206c8bd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH87FI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c19f30c4c9a444922cb61cf136cd48d9674d2134b98e618f6e7ab9654eb7a7ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac8e4d6a033b6a2d130404eb06e193b248a76308d4a82eeb5736d4f251af6826"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH61DI (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ccb5cecbe797ba2e130f297ec86bfbdc629ebaf919065e50d3f8911cc05b3a1d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-XM12-3227 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c67607819bad2d7abfd1d47eebad947f9920352c33b96db61f9f25c05bddc7c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5502f7f96b9ca121d3b52a1a804c877839e76e3dbb45beda100bea672067d26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A85XM-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "104c3173aff7cbf07c72956516cdc7c34e6169604293aec90e86bcc4384a799a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4c6ce9d730179b7a5cab37a8744a2ca588c9a2a8b8462b62d2c96757adaee61"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ca64768668cac95b2c49594df5412492fd3e84a5ec279f5e5782d9d08d641e8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d28128151819a06848aeb241f3dc4737d3a9b3918b739f8c512085af375b368"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32b1eee6b2e1553ceb902d17d0ecf5534034685dc8c2863f9ec99d2dc587bb72"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "26778248ce3156bc2d3e70461f079d1292435aeca9ea2c6ef0e536c979845164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b51371864d4322ca5c584cded0f6bbad11dd01cf498b841b270ede1f03497137"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c27a0ca23c6d3ee9eea18c0e700f33f13c568dc209341b8ab4b64148a235c70b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "023f4c9928786909d9fcb2143edcb1ce9a20d1b15cf281559996f21617503f91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eeef50c6dbb27c9ae8bbca0e2be73384ba60469957414bc2943892ef28836b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3c50ff8443f151a8022b4934dc0e87cd74d500719b586c82bce2184bac3ec2d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cac095d827e58ed8992e3eb2bc4285823c8378247de15d7ddc3f97c79d275f8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c3d754d426defee4e705ab9b72862764a22a64f316a1f8a2563a72cae308c31f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4a901cc6ab10bd1546d8453bd1bcf75379880ee549329c03ecfd4b445b52de99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58d19c2ca76b765809a99f0eb2227291f4f51860723d303f9ef0cb20d4d19dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98d605b3578ac3b7518f151c24c937455b204441ba806ea244f22e54c03af2be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8222535124cf1bf77c3af3e6ce3b3a942390794440b01f8d2fd44b4e416b049b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "33793d37f2415d724c58c993c2ad6cc67d661253b929165f6f0ab0c88c8325c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "235c6f47146d2bf5dd20ff3971421489c69517be3b467ec1a2b6f7dc0f2d8a94"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1859a1e462fbb1db039e99f7cfea16e6da59188ad37b313181211ab2c3d70150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901658f7361b4d15145d07de99b9d921d7293699a15479f086f4d1a00fedf089"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A55M-DS2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4be0b29ff5fd55d855e5529912b92acea24740eb7fa0250ba01a44824c4685b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E350N WIN8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4fd09df247091f6c6ead14d012325d14055ab38095f5c4d8c258352f48c2052f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7e95d1a64976573e5ed1c8c3466e24037d33fcfbbd9f02d1ae69643fdaa44d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASV3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00d23573a79d5737cfc6a1094b12e22c8a8601618934193dba2242f0246af559"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61TN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f19c7fe7e25a9a41b4065791fa390b8d79ceee0cc7fafae702a92a6ec0e86696"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "506f5abb01dade2137a4b8d3ea42d1127f24f59f96339e77c59883571ae63443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ffb3921b21ffdb876b2cbc7b6ff939fb5168efdf5ceed571d2d220e195fb150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25c38be153f85659377f63b4968f5425bf7e8d6c99fb695eeaaed973939bd943"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcd286446cd358474b492a2c9a4d49eab652aeda52c0e69ef94b1cd12b7579b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2P-R3 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e26169fbddeb0ca9b8283dba44d571b554487b5dd9348caf84fe9d7a6a20dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0adc82a52cbe367efed31279d6e1ea3ab98311db49a68ae149e4af9a70ab67a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67-DS3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ff5f5836457aa7fd0f02d037d0dc23b5c5a49fef8f7360268d7276e577060256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b8fb25742a7753c0f7ebac50e9e3d6186ea123dcd0e33eb0a64abc111eaa7728"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3R-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "435e0ba0715afef2a466835c19105c6480a35f921af59b863f2c29ed2d1de0e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MA-D2H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8d1572bf6bb0b658f618c735322e6c1aa20d01b79c9100e3d177b6c27ced480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-D3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d36182899b2c912ba34f51b50bbf228e1ec367b0fc009d20d34e4f011f4e9fc1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-UD3-B3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c46c76138b4cf0a3407c3fe2844c11fdd5c0c2c4d335ab58aa0b0617a6f13f33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3R-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50d3dc2e80333527177e5f5e1dbc06357ecaae3fa2dd1d51272a906ade3cd7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD4-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "beedbc9f64d20973229b584d965bcaf2f8fdc4a88c4bc202eb5e9f5565c85fa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3-iSSD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f615668a861c9d430afe7b40f42f352881132d193d16426951563997fbdc81da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3552918dfc84151da3dabc0687a4513f1dea9d6879d53a8b8646398fc462e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4f33b57947d45b3e43bdd7bafd68d2f4c799fdf0b72a8a2ca61319ab760ae67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68P-DS3 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5823dc1fbc95d092e02519c069c4fd111783428757b969fd8b9dbac1009fe91e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "384d9e1e3cad82b7841f33115dbfdf38589420716c8c0aa5a190971a44aa39e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2065b895916edbec17057603ba98779b4bd10cbfc3477a87c767a36fb027b76a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c9d4c8caf3307da9b1d6543e00682a3cddf1dc06c41f0f973355cb9c8554bc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68AP-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7013aca3c062f040cf9d0448f7e2892101b30e5956915c8dc3a53c3c2aacd13d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68M-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6d451499ebe6d8dd621f1c2ebb00b87dd01f7870b791e682b66d5f33eb01d8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c676efd7e6c8bf4a7d3da8aa51b2b564d77c67f6d2be68b25232326166e0c20b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ae3a48e1a715461671107f9e8e790cfd1c4ee4d2b8ddaa50b140d67622b920f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b2aaaa9f92c0e6fa23a59bdda27d5cb26e8fdece26bc756893490d3ee657a4b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN-D (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcf7c3d07e1bf9f1347e48dd3ac6e45fc9492648985a06394ab6568a7a71e262"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b619d396378c2e6bc2f550cf1c55cd17e7091fa4ab90761f32582eba28884d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cfa61511dad005aeb4ab01678f87169c7d509d59042b2fd33e8b58bdb34febe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL3 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7196b64c2f89763d2ea7f0f106d06352ae2c0e17a83fed2d10548e1aefa39245"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD4H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ff3a0cad413c0b862ba515d60cac0e98e373e199f0d92c79a77ebe6fa6a2247"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q77M-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43216a565586f1c49090c7982e6f3c1e41b179e430d7ac0c47c8ad07308a5bc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f6cd8446d78da9720f06cd360a48e9b6bdae33e342e18cb05420adb78fe05858"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1209a2eb0b5eb9324e1a8ce11c77ca141023b94b988bd1df4db390dda4c275a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77P-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00fa676c6d12df8a48049f39b87e3343769356e880d2abcaf04ab1b679c450f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP4 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5310894b9a2bb510f37c49852d743d64343a698436ca22d9b7a44bcf20e447a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q1742F",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "350cc51e5e7fa472e95460eed374eb1f9a43ea4e615e2654c26a9da4d83bf529"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f86f7ad9ffbc7437bba6bcf99d08b8de38f945bedff00c2d35362387077eabea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q2542N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d6faf2792722d1b9fbff087e4d85ddd2a4f9922a7848ed4db99284687df3b23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "642290f1b37e616b64b3c6b60921e24ddad599a38e67cd46a281b24c1ab62bb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-rp5-retail-system-model-5810",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "2a090cfc69ebd88dbe2e2e9c52a7f3a75b8b150478e30a752c5c0f09129f3bc9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-g2-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "d0a54ae69192d2d0289b2c9ae33a6ffd0a0db78189b41b032e18a3452c878eab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z228-microtower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "5174331d57cf3392012b00a6de381ee7a873f7fbd217bfa3e744b7dd6136807b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z820-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b02cdd16e398c2f31e9641d27d99865c404357136f857a1e2dcf2f7479b9457d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z420-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "05e89382e73afb280f637acbfa1029e9107dd30c78df37b6a00f184657f5f2c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b6fd5cd3364bdfa459f040c1693b879bbcf508513124bb95b5f36743efd8e73c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z220-convertible-minitower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "cc5a9c2d4827e9b1501c2dc0a464f580d4a2d65e4ff83dbab548e51839339d06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-400-g1-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "289f0fa72150a52f2b71bc6bf23f343ad9c1c412aa5977e89ffde7474562cb18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-600-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "a80a5c395fd3b28b0130d4579dd3e462f9e38bccb2a42cc5245cedd70b27ff0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-elite-8380-convertible-minitower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "455164a23e14f8cc9567b458dfb85106294f149f0e446d2d8b4036551f894cf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-705-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "1650cfd06bb698ad3cecd9e0c38b0de04d29f9c397492ba70b985b033e2458da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-pro-6305-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "44988d41019bf5c7989b71e966b97752f60c835ba2300c7d55323eded97c21e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-800-g1-tower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "659078fcdff1dead57cd05eafa0af4de667b52e981d1b907f0d963b41902dc7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-10w-type-82st-82su",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "69dae6e64125b37fa0ee09f5cd9bf3581b3244e99d9b4651395834f9eef021af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "b04cc879ac09941e714a8ccce371111bcbbc8d7b1dd1ecdc823de09fd2dad7b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m72z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "4438137139edb1e04de7e265e94444e1c87316b0821178285d87763f00bcc5df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-92z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "e37c7b66aef1c9702b08f3d08a41edf3e4617fc94a17f318297506868e1d254e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "76c5461e86a33095c4191aa02ccba85cdad5f24ac9c816fb8ab6f408cf32dcdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-62-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "73a8fdf89ed1a2d0af45142f4b4498545ce4182ca704ad2b292490263480b1fd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-510-22asr",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "47affcc25ded66333920985902473398438b49dac28be82542062ddabffec3c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-300-22isu",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "a6b6a2940a5f4c98e2f531624707fd8ab7dc61f4b3d3de0457fe00ba3cc5c135"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c460-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "1235ca01cc48484db1157b312ec1632c45be511cfbff28d25404df0a3df47148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c365-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "7cf94927f6826886883baf229f3cc2f2545588a564ddb7583f2b52853aeb5b21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-erazer-x700-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "8dbcebb69c00242f0a346c34776171061d606262f412e92f84be99301d413c21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-h520e-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "0ee94a5c0d4b93a2a1618d144bb0a505865a5d308c484c80fcf26fe31f23617a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Supermicro",
"versions": [
{
"status": "affected",
"version": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Binarly Research team"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T21:48:41.125Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "UEFI Forum Standards on SecureBoot and Driver Signing Advisory",
"tags": [
"product",
"technical-description"
],
"url": "https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html"
},
{
"name": "Binarly Finder\u0027s Advisory",
"tags": [
"technical-description"
],
"url": "https://www.binarly.io/advisories/brly-2024-005"
},
{
"name": "CERT/CC Advisory",
"tags": [
"third-party-advisory"
],
"url": "https://kb.cert.org/vuls/id/455367"
},
{
"name": "Binarly Technical Description",
"tags": [
"technical-description",
"signature"
],
"url": "https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md"
},
{
"name": "Supermicro Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
},
{
"name": "Intel Advisory cum End-ofLife anouncement",
"tags": [
"vendor-advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
},
{
"name": "Fujitsu Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
},
{
"name": "Gigabyte Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.gigabyte.com/us/Support/Security/2205"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Insecure Platform Key (PK) used in UEFI system firmware signature",
"x_generator": {
"engine": "VINCE 3.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-8105"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-8105",
"datePublished": "2024-08-26T19:15:11.237Z",
"dateReserved": "2024-08-22T19:50:07.296Z",
"dateUpdated": "2025-08-25T21:48:41.125Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-50197 (GCVE-0-2023-50197)
Vulnerability from cvelistv5 – Published: 2024-05-03 02:14 – Updated: 2024-08-15 15:50
VLAI?
Title
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability
Summary
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.
Severity ?
7.8 (High)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Driver & Support Assistant |
Affected:
23.3.25.6
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:intel:driver\\\u0026support_assistant:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "driver\\\u0026support_assistant",
"vendor": "intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-50197",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-19T14:38:03.377106Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:50:50.156Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T22:09:49.786Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ZDI-23-1773",
"tags": [
"x_research-advisory",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1773/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Driver \u0026 Support Assistant",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"dateAssigned": "2023-12-05T13:37:59.540-06:00",
"datePublic": "2023-12-13T12:13:10.483-06:00",
"descriptions": [
{
"lang": "en",
"value": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver \u0026 Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-03T02:14:22.353Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-23-1773",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1773/"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2023-50197",
"datePublished": "2024-05-03T02:14:22.353Z",
"dateReserved": "2023-12-05T16:15:17.539Z",
"dateUpdated": "2024-08-15T15:50:50.156Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-42099 (GCVE-0-2023-42099)
Vulnerability from cvelistv5 – Published: 2024-05-03 02:13 – Updated: 2024-08-15 15:50
VLAI?
Title
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability
Summary
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.
Severity ?
7.8 (High)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Driver & Support Assistant |
Affected:
23.3.25.6
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:intel:driver\\\u0026support_assistant:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "driver\\\u0026support_assistant",
"vendor": "intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42099",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-19T14:47:24.000027Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:50:14.641Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:50.384Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ZDI-23-1449",
"tags": [
"x_research-advisory",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1449/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Driver \u0026 Support Assistant",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"dateAssigned": "2023-09-06T16:25:45.367-05:00",
"datePublic": "2023-09-21T13:10:14.369-05:00",
"descriptions": [
{
"lang": "en",
"value": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver \u0026 Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-03T02:13:11.158Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-23-1449",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1449/"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2023-42099",
"datePublished": "2024-05-03T02:13:11.158Z",
"dateReserved": "2023-09-06T21:14:24.432Z",
"dateUpdated": "2024-08-15T15:50:14.641Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3411 (GCVE-0-2024-3411)
Vulnerability from cvelistv5 – Published: 2024-04-30 18:39 – Updated: 2025-11-04 17:20
VLAI?
Title
Insufficient Randomness When Validating an IPMI Authenticated Session
Summary
Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.
Severity ?
9.1 (Critical)
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:intel:*:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "*",
"vendor": "intel",
"versions": [
{
"status": "affected",
"version": "IPMI 2.0, revision 1.1E7"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-3411",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-01T15:09:39.893298Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-331",
"description": "CWE-331 Insufficient Entropy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T21:17:11.689Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T17:20:29.012Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://kb.cert.org/vuls/id/163057"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability"
},
{
"url": "https://www.kb.cert.org/vuls/id/163057"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "iDRAC8",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2.86.86.86"
}
]
},
{
"product": "IPMI",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "2.0, revision 1.1E7"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-331 Insufficient Entropy",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-03T20:35:33.625Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://kb.cert.org/vuls/id/163057"
},
{
"url": "https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf"
},
{
"url": "https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Insufficient Randomness When Validating an IPMI Authenticated Session",
"x_generator": {
"engine": "VINCE 3.0.4",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-3411"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-3411",
"datePublished": "2024-04-30T18:39:36.861Z",
"dateReserved": "2024-04-05T20:48:24.306Z",
"dateUpdated": "2025-11-04T17:20:29.012Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4324 (GCVE-0-2023-4324)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:17.767Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4324",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T17:54:08.973670Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T17:57:24.262Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:23.250Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4324",
"datePublished": "2023-08-15T18:25:38.873Z",
"dateReserved": "2023-08-14T21:06:24.381Z",
"dateUpdated": "2025-11-04T16:10:17.767Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4325 (GCVE-0-2023-4325)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities
Summary
Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:18.806Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4325",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T17:58:07.119861Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:00:04.293Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:23.421Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4325",
"datePublished": "2023-08-15T18:25:38.706Z",
"dateReserved": "2023-08-14T21:10:36.380Z",
"dateUpdated": "2025-11-04T16:10:18.806Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4326 (GCVE-0-2023-4326)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites
Summary
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites
Severity ?
No CVSS data available.
CWE
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:19.802Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"status": "affected",
"version": "0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4326",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:01:37.725882Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:03:09.590Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-327",
"description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:54:56.874Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4326",
"datePublished": "2023-08-15T18:25:38.586Z",
"dateReserved": "2023-08-14T21:19:37.314Z",
"dateUpdated": "2025-11-04T16:10:19.802Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4329 (GCVE-0-2023-4329)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:22.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4329",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:19:53.153951Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:22:13.644Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:24.200Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4329",
"datePublished": "2023-08-15T18:25:38.060Z",
"dateReserved": "2023-08-14T21:25:58.373Z",
"dateUpdated": "2025-11-04T16:10:22.787Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4331 (GCVE-0-2023-4331)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols
Summary
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols
Severity ?
No CVSS data available.
CWE
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:23.816Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4331",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:23:15.858042Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:25:44.197Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-327",
"description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:55:43.479Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4331",
"datePublished": "2023-08-15T18:25:37.408Z",
"dateReserved": "2023-08-14T21:25:58.466Z",
"dateUpdated": "2025-11-04T16:10:23.816Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4332 (GCVE-0-2023-4332)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file
Summary
Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file
Severity ?
No CVSS data available.
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:24.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4332",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:27:15.721447Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:29:50.058Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:56:55.253Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4332",
"datePublished": "2023-08-15T18:25:37.323Z",
"dateReserved": "2023-08-14T21:25:58.608Z",
"dateUpdated": "2025-11-04T16:10:24.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4334 (GCVE-0-2023-4334)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller Web server (nginx) is serving private files without any authentication
Summary
Broadcom RAID Controller Web server (nginx) is serving private files without any authentication
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:27.191Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4334",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:35:07.326506Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:35:21.552Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller Web server (nginx) is serving private files without any authentication"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:24.923Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller Web server (nginx) is serving private files without any authentication",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4334",
"datePublished": "2023-08-15T18:25:37.123Z",
"dateReserved": "2023-08-14T21:25:58.724Z",
"dateUpdated": "2025-11-04T16:10:27.191Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4335 (GCVE-0-2023-4335)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2024-10-08 19:37
VLAI?
Title
Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux
Summary
Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:24:04.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unaffected",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4335",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:35:49.902757Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:37:21.254Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.101Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4335",
"datePublished": "2023-08-15T18:25:37.042Z",
"dateReserved": "2023-08-14T21:25:58.771Z",
"dateUpdated": "2024-10-08T19:37:21.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-4336 (GCVE-0-2023-4336)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:28.367Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4336",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:37:55.233368Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:38:10.743Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.290Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4336",
"datePublished": "2023-08-15T18:25:36.778Z",
"dateReserved": "2023-08-14T21:27:55.157Z",
"dateUpdated": "2025-11-04T16:10:28.367Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4337 (GCVE-0-2023-4337)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
Summary
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:29.412Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4337",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:39:11.305505Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:39:39.529Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.451Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4337",
"datePublished": "2023-08-15T18:25:36.690Z",
"dateReserved": "2023-08-14T21:27:55.221Z",
"dateUpdated": "2025-11-04T16:10:29.412Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4338 (GCVE-0-2023-4338)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:30.391Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4338",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:40:13.790581Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:40:23.085Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.625Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4338",
"datePublished": "2023-08-15T18:25:36.445Z",
"dateReserved": "2023-08-14T21:27:55.350Z",
"dateUpdated": "2025-11-04T16:10:30.391Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4339 (GCVE-0-2023-4339)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions
Summary
Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:31.336Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4339",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:41:47.878961Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:41:58.772Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.818Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4339",
"datePublished": "2023-08-15T18:25:35.162Z",
"dateReserved": "2023-08-14T21:27:55.417Z",
"dateUpdated": "2025-11-04T16:10:31.336Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4340 (GCVE-0-2023-4340)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file
Summary
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:32.353Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4340",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:42:32.043734Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:43:09.978Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.025Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4340",
"datePublished": "2023-08-15T18:25:35.073Z",
"dateReserved": "2023-08-14T21:27:55.493Z",
"dateUpdated": "2025-11-04T16:10:32.353Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4341 (GCVE-0-2023-4341)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI
Summary
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:33.306Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4341",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:43:37.493202Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:43:58.895Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.182Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4341",
"datePublished": "2023-08-15T18:25:34.542Z",
"dateReserved": "2023-08-14T21:27:55.642Z",
"dateUpdated": "2025-11-04T16:10:33.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4342 (GCVE-0-2023-4342)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:34.249Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4342",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:02:18.354310Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:02:31.717Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.404Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4342",
"datePublished": "2023-08-15T18:25:34.363Z",
"dateReserved": "2023-08-14T21:29:11.769Z",
"dateUpdated": "2025-11-04T16:10:34.249Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4343 (GCVE-0-2023-4343)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter
Summary
Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:35.278Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4343",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:03:40.979136Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:03:56.153Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.622Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4343",
"datePublished": "2023-08-15T18:25:34.170Z",
"dateReserved": "2023-08-14T21:29:37.816Z",
"dateUpdated": "2025-11-04T16:10:35.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4344 (GCVE-0-2023-4344)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:25 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection
Summary
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection
Severity ?
9.8 (Critical)
CWE
- CWE-331 - Insufficient Entropy
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:36.254Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-4344",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:24:49.458889Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:26:09.035Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-331",
"description": "CWE-331: Insufficient Entropy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:58:03.947Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4344",
"datePublished": "2023-08-15T18:25:34.072Z",
"dateReserved": "2023-08-14T21:29:52.908Z",
"dateUpdated": "2025-11-04T16:10:36.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4323 (GCVE-0-2023-4323)
Vulnerability from cvelistv5 – Published: 2023-08-15 18:21 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup
Summary
Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:16.803Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4323",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:05:02.040092Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:05:12.818Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:23.092Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4323",
"datePublished": "2023-08-15T18:21:36.882Z",
"dateReserved": "2023-08-14T21:02:26.963Z",
"dateUpdated": "2025-11-04T16:10:16.803Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4345 (GCVE-0-2023-4345)
Vulnerability from cvelistv5 – Published: 2023-08-15 17:46 – Updated: 2025-11-04 16:10
VLAI?
Title
Broadcom RAID Controller web interface is vulnerable client-side control bypass
Summary
Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Affected:
0 , < 7.017.011.000
(custom)
|
|||||||
|
|||||||||
Credits
Intel DCG
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:37.202Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4345",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:16:56.558213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:17:59.774Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:27.021Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable client-side control bypass",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4345",
"datePublished": "2023-08-15T17:46:38.983Z",
"dateReserved": "2023-08-14T21:30:09.111Z",
"dateUpdated": "2025-11-04T16:10:37.202Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2022-29901 (GCVE-0-2022-29901)
Vulnerability from cvelistv5 – Published: 2022-07-12 00:00 – Updated: 2024-08-03 06:33
VLAI?
Title
Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)
Summary
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Severity ?
5.6 (Medium)
CWE
- CWE-200 - Information Exposure
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel Microprocessors |
Affected:
generations 6 to 8
|
Credits
Johannes Wikner - ETH Zürich
Kaveh Razavi - ETH Zürich
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:33:43.000Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://comsec.ethz.ch/retbleed"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
},
{
"name": "[oss-security] 20220712 Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/2"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/4"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/5"
},
{
"name": "[oss-security] 20220713 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/13/1"
},
{
"name": "FEDORA-2022-c69ef9c1dd",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/"
},
{
"name": "FEDORA-2022-8aab5b5cde",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/"
},
{
"name": "DSA-5207",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5207"
},
{
"name": "[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20221007-0007/"
},
{
"name": "[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
},
{
"name": "GLSA-202402-07",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202402-07"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Microprocessors",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "generations 6 to 8"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Johannes Wikner - ETH Z\u00fcrich"
},
{
"lang": "en",
"value": "Kaveh Razavi - ETH Z\u00fcrich"
}
],
"descriptions": [
{
"lang": "en",
"value": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Information Exposure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-04T08:06:41.365488",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"url": "https://comsec.ethz.ch/retbleed"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
},
{
"name": "[oss-security] 20220712 Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/2"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/4"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/5"
},
{
"name": "[oss-security] 20220713 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/13/1"
},
{
"name": "FEDORA-2022-c69ef9c1dd",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/"
},
{
"name": "FEDORA-2022-8aab5b5cde",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/"
},
{
"name": "DSA-5207",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5207"
},
{
"name": "[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221007-0007/"
},
{
"name": "[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
},
{
"url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
},
{
"name": "GLSA-202402-07",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202402-07"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-29901",
"datePublished": "2022-07-12T00:00:00",
"dateReserved": "2022-04-28T00:00:00",
"dateUpdated": "2024-08-03T06:33:43.000Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0583 (GCVE-0-2020-0583)
Vulnerability from cvelistv5 – Published: 2020-03-12 21:08 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel® Smart Sound Technology |
Affected:
before 10th Generation Intel® Core™ i7 Processors - version 3431
Affected: before 8th Generation Intel® Core™ Processors - version 3349 Affected: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.304Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel\u00ae Smart Sound Technology",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "before 10th Generation Intel\u00ae Core\u2122 i7 Processors - version 3431"
},
{
"status": "affected",
"version": "before 8th Generation Intel\u00ae Core\u2122 Processors - version 3349"
},
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-12T21:08:50.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0583",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel\u00ae Smart Sound Technology",
"version": {
"version_data": [
{
"version_value": "before 10th Generation Intel\u00ae Core\u2122 i7 Processors - version 3431"
},
{
"version_value": "before 8th Generation Intel\u00ae Core\u2122 Processors - version 3349"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0583",
"datePublished": "2020-03-12T21:08:50.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.304Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0551 (GCVE-0-2020-0551)
Vulnerability from cvelistv5 – Published: 2020-03-12 21:04 – Updated: 2024-08-04 06:02
VLAI?
Summary
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
Severity ?
No CVSS data available.
CWE
- Information Disclosure
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) Processors Load Value Injection |
Affected:
See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.308Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0002/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Processors Load Value Injection",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T09:06:12.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0002/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0551",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Processors Load Value Injection",
"version": {
"version_data": [
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200320-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200320-0002/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0551",
"datePublished": "2020-03-12T21:04:48.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.308Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0550 (GCVE-0-2020-0550)
Vulnerability from cvelistv5 – Published: 2020-03-12 21:02 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html
Severity ?
No CVSS data available.
CWE
- Information Disclosure
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Snoop Assisted L1D Sampling Advisory |
Affected:
See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.329Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0001/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Snoop Assisted L1D Sampling Advisory",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T09:06:13.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0001/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0550",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snoop Assisted L1D Sampling Advisory",
"version": {
"version_data": [
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200320-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200320-0001/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0550",
"datePublished": "2020-03-12T21:02:34.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.329Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0530 (GCVE-0-2020-0530)
Vulnerability from cvelistv5 – Published: 2020-03-12 20:55 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) NUC Firmware |
Affected:
See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.389Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUC Firmware",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-12T20:55:01.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUC Firmware",
"version": {
"version_data": [
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0530",
"datePublished": "2020-03-12T20:55:01.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.389Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0574 (GCVE-0-2020-0574)
Vulnerability from cvelistv5 – Published: 2020-03-12 20:52 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper configuration in block design for Intel(R) MAX(R) 10 FPGA all versions may allow an authenticated user to potentially enable escalation of privilege and information disclosure via physical access.
Severity ?
No CVSS data available.
CWE
- Information Disclosure
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) MAX(R) 10 FPGA |
Affected:
All versions
Affected: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.194Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) MAX(R) 10 FPGA",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "All versions"
},
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper configuration in block design for Intel(R) MAX(R) 10 FPGA all versions may allow an authenticated user to potentially enable escalation of privilege and information disclosure via physical access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-18T12:23:43.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0574",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) MAX(R) 10 FPGA",
"version": {
"version_data": [
{
"version_value": "All versions"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper configuration in block design for Intel(R) MAX(R) 10 FPGA all versions may allow an authenticated user to potentially enable escalation of privilege and information disclosure via physical access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0574",
"datePublished": "2020-03-12T20:52:29.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.194Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0567 (GCVE-0-2020-0567)
Vulnerability from cvelistv5 – Published: 2020-03-12 20:51 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) Graphics Drivers |
Affected:
before version 26.20.100.7212
Affected: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.313Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0003/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Graphics Drivers",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "before version 26.20.100.7212"
},
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T09:06:24.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0003/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0567",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before version 26.20.100.7212"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200320-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200320-0003/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0567",
"datePublished": "2020-03-12T20:51:09.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.313Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}