Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12201 (GCVE-0-2018-12201)
Vulnerability from cvelistv5 – Published: 2019-03-14 20:00 – Updated: 2024-09-16 18:14- Escalation of privilege
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel Corporation | Intel Platform Sample / Silicon Reference firmware |
Affected:
Multiple versions.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:30:59.535Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Platform Sample / Silicon Reference firmware",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "Multiple versions."
}
]
}
],
"datePublic": "2019-03-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-03T21:06:09.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-03-12T00:00:00",
"ID": "CVE-2018-12201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Platform Sample / Silicon Reference firmware",
"version": {
"version_data": [
{
"version_value": "Multiple versions."
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2018-12201",
"datePublished": "2019-03-14T20:00:00.000Z",
"dateReserved": "2018-06-11T00:00:00.000Z",
"dateUpdated": "2024-09-16T18:14:23.682Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2018-12201
Vulnerability from fkie_nvd - Published: 2019-03-14 20:29 - Updated: 2024-11-21 03:44{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDA75B0-0DB9-4E0E-BF2C-724572FFB46F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49E1AD-DBDC-40A4-8ED7-3AA5515B5599",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"matchCriteriaId": "AD846582-09BD-42DD-8F2F-044997B78F8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EB11F-CB85-4753-B0C9-CA70F341C794",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"matchCriteriaId": "A42A7B22-A6FB-4CDC-AE1E-7C23A5A66C5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEAA43A-4D97-4E13-82E1-895F3B368B25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6BAE0B-103D-430E-BAE9-429881620DE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDA75B0-0DB9-4E0E-BF2C-724572FFB46F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49E1AD-DBDC-40A4-8ED7-3AA5515B5599",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"matchCriteriaId": "AD846582-09BD-42DD-8F2F-044997B78F8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EB11F-CB85-4753-B0C9-CA70F341C794",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"matchCriteriaId": "A42A7B22-A6FB-4CDC-AE1E-7C23A5A66C5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"matchCriteriaId": "2A645E70-B00F-4EE8-9C06-B6382791637A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB59CA7-8335-43F6-A410-DF7BD12855FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"matchCriteriaId": "C39ED459-DE01-4037-A01F-C13BD2E36508",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"matchCriteriaId": "93396E3B-72F7-4BDA-A872-3E0DE12884C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEAA43A-4D97-4E13-82E1-895F3B368B25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6BAE0B-103D-430E-BAE9-429881620DE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB336210-AC71-4DFA-878F-647EC94DF495",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49E1AD-DBDC-40A4-8ED7-3AA5515B5599",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"matchCriteriaId": "AD846582-09BD-42DD-8F2F-044997B78F8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EB11F-CB85-4753-B0C9-CA70F341C794",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"matchCriteriaId": "A42A7B22-A6FB-4CDC-AE1E-7C23A5A66C5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEAA43A-4D97-4E13-82E1-895F3B368B25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6BAE0B-103D-430E-BAE9-429881620DE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB336210-AC71-4DFA-878F-647EC94DF495",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49E1AD-DBDC-40A4-8ED7-3AA5515B5599",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"matchCriteriaId": "AD846582-09BD-42DD-8F2F-044997B78F8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EB11F-CB85-4753-B0C9-CA70F341C794",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"matchCriteriaId": "A42A7B22-A6FB-4CDC-AE1E-7C23A5A66C5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"matchCriteriaId": "2A645E70-B00F-4EE8-9C06-B6382791637A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB59CA7-8335-43F6-A410-DF7BD12855FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"matchCriteriaId": "C39ED459-DE01-4037-A01F-C13BD2E36508",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"matchCriteriaId": "93396E3B-72F7-4BDA-A872-3E0DE12884C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEAA43A-4D97-4E13-82E1-895F3B368B25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6BAE0B-103D-430E-BAE9-429881620DE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access."
},
{
"lang": "es",
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en el firmware Platform Sample / Silicon Reference para los procesadores de 8\u00aa generaci\u00f3n Intel(R) Core Processor, los procesadores de 7\u00aa generaci\u00f3n Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor e Intel(R) Celeron N4000 Processor podr\u00eda permitir que un usuario privilegiado pueda ejecutar c\u00f3digo arbitrario mediante acceso local."
}
],
"id": "CVE-2018-12201",
"lastModified": "2024-11-21T03:44:44.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-14T20:29:00.663",
"references": [
{
"source": "secure@intel.com",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"source": "secure@intel.com",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2019-AVI-108
Vulnerability from certfr_avis - Published: 2019-03-13 - Updated: 2019-03-13
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Processeur Intel Celeron J4105 | ||
| Intel | N/A | Intel CSME versions 11.0 à 11.8.55 | ||
| Intel | N/A | Intel CSME versions 11.20 à 11.22.0 | ||
| Intel | N/A | Intel Data Center Manager SDK versions antérieures à 5.0.2 | ||
| Intel | N/A | Intel CSME versions 12.0 à 12.0.10 | ||
| Intel | N/A | Processeur Intel Celeron N4000 | ||
| Intel | N/A | Intel Accelerated Storage Manager RSTe versions 5.5 et antérieures | ||
| Intel | N/A | Intel Server Board | ||
| Intel | N/A | Intel Server System | ||
| Intel | N/A | Processeur Intel Core de 7ème génération | ||
| Intel | N/A | Intel Compute ModuleIntel Graphics Driver pour Windows versions antérieures à 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373 | ||
| Intel | N/A | Intel CSME versions 11.10 à 11.11.55 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 4.0 à 4.0.5 | ||
| Intel | N/A | Processeur Intel Core de 8ème génération | ||
| Intel | N/A | Processeur Intel Pentium Silver N5000 | ||
| Intel | N/A | Composant Intel Unite Solution software server version 3.2 à 3.3 | ||
| Intel | N/A | Processeur Intel Celeron N4100 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.01.00.152.0 à SPS 4.01.02.173 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.00.04.367 à SPS 4.00.04.382 | ||
| Intel | N/A | Processeur Intel Pentium Silver J5005 | ||
| Intel | N/A | Processeur Intel Celeron J4005 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 3.0 à 3.1.50 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeur Intel Celeron J4105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.0 \u00e0 11.8.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.20 \u00e0 11.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 12.0 \u00e0 12.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.10 \u00e0 11.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Composant Intel Unite Solution software server version 3.2 \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver J5005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron J4005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12223",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12223"
},
{
"name": "CVE-2019-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0108"
},
{
"name": "CVE-2018-12215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12215"
},
{
"name": "CVE-2018-12188",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12188"
},
{
"name": "CVE-2018-12205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12205"
},
{
"name": "CVE-2019-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0103"
},
{
"name": "CVE-2018-12222",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12222"
},
{
"name": "CVE-2018-12212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12212"
},
{
"name": "CVE-2018-12213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12213"
},
{
"name": "CVE-2018-12202",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12202"
},
{
"name": "CVE-2018-12199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12199"
},
{
"name": "CVE-2018-12221",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12221"
},
{
"name": "CVE-2019-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0107"
},
{
"name": "CVE-2018-12191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12191"
},
{
"name": "CVE-2018-12200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12200"
},
{
"name": "CVE-2018-12204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12204"
},
{
"name": "CVE-2018-12214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12214"
},
{
"name": "CVE-2019-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0105"
},
{
"name": "CVE-2018-18089",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18089"
},
{
"name": "CVE-2019-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0109"
},
{
"name": "CVE-2018-12187",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12187"
},
{
"name": "CVE-2018-12219",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12219"
},
{
"name": "CVE-2019-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0102"
},
{
"name": "CVE-2018-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12192"
},
{
"name": "CVE-2018-12208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12208"
},
{
"name": "CVE-2019-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0101"
},
{
"name": "CVE-2018-12217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12217"
},
{
"name": "CVE-2018-12189",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12189"
},
{
"name": "CVE-2018-12196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12196"
},
{
"name": "CVE-2019-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0135"
},
{
"name": "CVE-2018-12201",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12201"
},
{
"name": "CVE-2018-12211",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12211"
},
{
"name": "CVE-2019-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0106"
},
{
"name": "CVE-2018-12203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12203"
},
{
"name": "CVE-2018-12209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12209"
},
{
"name": "CVE-2019-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0112"
},
{
"name": "CVE-2019-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0110"
},
{
"name": "CVE-2018-12185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12185"
},
{
"name": "CVE-2019-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0111"
},
{
"name": "CVE-2018-12218",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12218"
},
{
"name": "CVE-2018-12220",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12220"
},
{
"name": "CVE-2018-12216",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12216"
},
{
"name": "CVE-2018-12224",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12224"
},
{
"name": "CVE-2019-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0104"
},
{
"name": "CVE-2018-12210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12210"
},
{
"name": "CVE-2018-12198",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12198"
},
{
"name": "CVE-2018-18090",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18090"
},
{
"name": "CVE-2018-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12190"
},
{
"name": "CVE-2018-18091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18091"
}
],
"initial_release_date": "2019-03-13T00:00:00",
"last_revision_date": "2019-03-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"
}
]
}
GSD-2018-12201
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-12201",
"description": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.",
"id": "GSD-2018-12201"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-12201"
],
"details": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.",
"id": "GSD-2018-12201",
"modified": "2023-12-13T01:22:30.405869Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-03-12T00:00:00",
"ID": "CVE-2018-12201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Platform Sample / Silicon Reference firmware",
"version": {
"version_data": [
{
"version_value": "Multiple versions."
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-12201"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-04-03T22:29Z",
"publishedDate": "2019-03-14T20:29Z"
}
}
}
GHSA-HRVM-W5C3-W9JQ
Vulnerability from github – Published: 2022-05-14 01:13 – Updated: 2022-05-14 01:13Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.
{
"affected": [],
"aliases": [
"CVE-2018-12201"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-03-14T20:29:00Z",
"severity": "HIGH"
},
"details": "Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.",
"id": "GHSA-hrvm-w5c3-w9jq",
"modified": "2022-05-14T01:13:35Z",
"published": "2022-05-14T01:13:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12201"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2018-12201
Vulnerability from fstec - Published: 12.03.2019{
"CVSS 2.0": "AV:L/AC:H/Au:N/C:N/I:C/A:C",
"CVSS 3.0": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Intel Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Intel Pentium), - (Intel Core), - (Intel Celeron)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01384",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-12201",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Intel Pentium, Intel Core, Intel Celeron",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Platform Sample/Silicon Reference \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel Core, Intel Pentium, Intel Celeron, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Platform Sample/Silicon Reference \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel Core, Intel Pentium, Intel Celeron \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-12201",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,7)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.