fkie_cve-2019-11139
Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:20
Summary
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
References
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlMailing List, Third Party Advisory
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlMailing List, Third Party Advisory
secure@intel.comhttps://seclists.org/bugtraq/2019/Dec/28Mailing List, Third Party Advisory
secure@intel.comhttps://support.f5.com/csp/article/K42433061?utm_source=f5support&amp%3Butm_medium=RSS
secure@intel.comhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_usThird Party Advisory
secure@intel.comhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Dec/28Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K42433061?utm_source=f5support&amp%3Butm_medium=RSS
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.htmlVendor Advisory
Impacted products
Vendor Product Version
debian debian_linux 8.0
opensuse leap 15.0
opensuse leap 15.1
intel xeon_8153_firmware -
intel xeon_8153 -
intel xeon_8156_firmware -
intel xeon_8156 -
intel xeon_8158_firmware -
intel xeon_8158 -
intel xeon_8160_firmware -
intel xeon_8160 -
intel xeon_8160f_firmware -
intel xeon_8160f -
intel xeon_8160m_firmware -
intel xeon_8160m -
intel xeon_8160t_firmware -
intel xeon_8160t -
intel xeon_8164_firmware -
intel xeon_8164 -
intel xeon_8168_firmware -
intel xeon_8168 -
intel xeon_8170_firmware -
intel xeon_8170 -
intel xeon_8170m_firmware -
intel xeon_8170m -
intel xeon_8176_firmware -
intel xeon_8176 -
intel xeon_8176f_firmware -
intel xeon_8176f -
intel xeon_8176m_firmware -
intel xeon_8176m -
intel xeon_8180_firmware -
intel xeon_8180 -
intel xeon_8180m_firmware -
intel xeon_8180m -
intel xeon_5115_firmware -
intel xeon_5115 -
intel xeon_5118_firmware -
intel xeon_5118 -
intel xeon_5119t_firmware -
intel xeon_5119t -
intel xeon_5120_firmware -
intel xeon_5120 -
intel xeon_5120t_firmware -
intel xeon_5120t -
intel xeon_5122_firmware -
intel xeon_5122 -
intel xeon_6126_firmware -
intel xeon_6126 -
intel xeon_6126f_firmware -
intel xeon_6126f -
intel xeon_6126t_firmware -
intel xeon_6126t -
intel xeon_6128_firmware -
intel xeon_6128 -
intel xeon_6130_firmware -
intel xeon_6130 -
intel xeon_6130f_firmware -
intel xeon_6130f -
intel xeon_6130t_firmware -
intel xeon_6130t -
intel xeon_6132_firmware -
intel xeon_6132 -
intel xeon_6134_firmware -
intel xeon_6134 -
intel xeon_6134m_firmware -
intel xeon_6134m -
intel xeon_6136_firmware -
intel xeon_6136 -
intel xeon_6138_firmware -
intel xeon_6138 -
intel xeon_6138f_firmware -
intel xeon_6138f -
intel xeon_6138t_firmware -
intel xeon_6138t -
intel xeon_6140_firmware -
intel xeon_6140 -
intel xeon_6140m_firmware -
intel xeon_6140m -
intel xeon_6142_firmware -
intel xeon_6142 -
intel xeon_6142f_firmware -
intel xeon_6142f -
intel xeon_6144_firmware -
intel xeon_6144 -
intel xeon_6146_firmware -
intel xeon_6146 -
intel xeon_6148_firmware -
intel xeon_6148 -
intel xeon_6148f_firmware -
intel xeon_6148f -
intel xeon_6150_firmware -
intel xeon_6150 -
intel xeon_6152_firmware -
intel xeon_6152 -
intel xeon_6154_firmware -
intel xeon_6154 -
intel xeon_4108_firmware -
intel xeon_4108 -
intel xeon_4109t_firmware -
intel xeon_4109t -
intel xeon_4110_firmware -
intel xeon_4110 -
intel xeon_4112_firmware -
intel xeon_4112 -
intel xeon_4114_firmware -
intel xeon_4114 -
intel xeon_4114t_firmware -
intel xeon_4114t -
intel xeon_4116_firmware -
intel xeon_4116 -
intel xeon_4116t_firmware -
intel xeon_4116t -
intel xeon_3104_firmware -
intel xeon_3104 -
intel xeon_3106_firmware -
intel xeon_3106 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8153_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2DFB869-33F8-4459-95CE-04555196776C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8153:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D6EBCF2-2DF1-41B8-BA7E-3B576CB653E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8156_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2219666-0265-4791-B2E0-0F65B526915A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8156:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D922C72-5646-4BC9-8554-C350BC489FA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8158_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D94CC9-23D3-4FB7-85EA-FB44EE4DA205",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8158:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B553518-4B86-4876-84BE-4C77769DA233",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8160_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39968F90-2D2F-418B-A8A4-BE992DEC1561",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D419FED8-FB40-40CE-82BA-A5D79DEB5A02",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8160f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8903A604-1176-45B9-B967-65624E3A6507",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8160f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0F30B1-3873-4120-8A73-3F93350745BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8160m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC4F99BB-52FB-4D1D-B783-F33A7CF99425",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8160m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28BCE14-2F61-4FF5-B3B9-AF60A08D89E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8160t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81284EE2-526F-42C5-96DB-0DA222C4CCE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8160t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21801FEA-5B52-4297-917C-2BA0EDDF57E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8164_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9A22A2-CF28-46EE-992B-42D5142877BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8164:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3931109-5AFA-4C11-9A4A-BC0E2C208E96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8168_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D56EAAC-499C-4E5F-895E-3CCC0EBD25C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F9A665-FB0F-4CEB-B3A7-5AEE55EBB676",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8170_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FA027A-93B1-4C10-9DAB-16C6BED90D29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE76F51B-8C7D-42D0-BD4F-AD2C2E8EA0A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8170m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4FDA8F4-77B6-4E0A-9891-B323EAEB1A29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8170m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1941CFA-881E-4863-8E13-49459EF4B6DF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8176_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E42B923-8CE9-4669-8AD9-62733DEA6F70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5613DF64-FF2F-4A47-BAE0-D2A8152036DF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8176f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35696FDE-A146-437B-A8F8-E23A656FD5FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8176f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81E98EA-6E25-44A4-A721-8E867DACC5EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8176m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A429F5-4EED-468D-95A6-BC81AAB707EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8176m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFBF5AC-88B4-4BE4-AA5F-950A4A62D89D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8180_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F487028-015D-4BCC-A639-F2DED35FD467",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8180:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D28D96F-67C3-4DAD-9A8A-AA0641B43744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_8180m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5A67280-25D1-43F0-8CF2-C6C90A312208",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_8180m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A36C0B5-0792-4895-A2E1-5FBB72E5FD76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_5115_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1609E1C0-7A46-4941-996E-5631A8A50B7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_5115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F88FF7-A45D-4B08-B3D0-B9D6D2CFBAE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_5118_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEB7879-90E3-43E8-8B31-34A1245AC25C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_5118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EAF827-76FF-45FF-811B-C26129361DF5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_5119t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D689D4C6-FB59-4759-9A08-B18238B99C6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_5119t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC08EC7-31FC-4A31-BC63-0CDAE900DD4D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6B2817-3923-4614-8ACD-2570DF3936B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_5120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31ACA3B7-70AF-4085-A80B-1154AB636EE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_5120t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD02B5E-7798-4505-B8E3-E1CEEB8C1845",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_5120t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1703CAB8-306C-4E37-94CA-7DE1B1CC5332",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_5122_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06BF3352-3208-4EB2-85AC-998354B8DBB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_5122:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEDAE12-BEB4-4BA4-ACB6-CFCAFB346C47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6126_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1069193-8BF5-4EB2-B8C8-E11D26562F66",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6126:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C001A4D3-704B-4C51-9025-3EEA74DEC82C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6126f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F661978-39C8-460A-A41D-2B0ADD476067",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6126f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8894B01-D94B-48BD-A2C5-FC2392E7E1B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6126t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06283C7-8104-447C-84E7-5AF39C10E2ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6126t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA6456F-708A-47AE-8573-AE2E4D19E5A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6128_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7E0ED9-684B-4A2F-AFBF-0D84707632F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79514ECE-C041-42CE-BA56-12FE918AEEF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA20D328-0D65-47D9-9AC0-74BAED085963",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E77EF6-A378-481A-A57D-295796DB4694",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6130f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC5962DA-4C52-49A2-93A2-B66180EC97E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6130f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1995BA-25F4-49CD-AC62-DCC372A0CAE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6130t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAACFC5A-9659-4BF7-B9FF-1F384EEBF857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6130t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "648CEB95-915C-44AA-AA62-57DF6366E0CE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6132_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E919175-FA64-4AFA-ABB6-23F965603A51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6132:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29FCCBDE-DDC6-425C-9EFF-F3420F582D59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6134_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0697B628-D7F9-4799-97CF-30BDC87BBB36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6134:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7341AC9C-193A-40C8-ACFA-B95E330A74C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6134m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98928B31-B2B3-47B0-BF06-B1BE9C801AB3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6134m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12062D98-F990-4B1F-ADCE-E76F5F879DFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6136_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14F68B37-A831-48CF-978D-5B69E36B7DA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6136:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C4FA382-57C9-4C90-91FC-0CCFA7374788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6138_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA239D1-6073-4E2A-A8EA-FDC5172B6017",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6138:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "396BF8C5-C6DE-4E5D-9125-8A36B274F428",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6138f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FF0CD52-3BCA-48DB-AD61-3675F548DA04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6138f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B64F57E-1A40-49FF-AC61-B5CFBC8B59EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6138t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A29477-CD74-4BA9-9907-E0DCFE645509",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6138t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD7263E-7101-4774-9DE2-6EA884ADBB45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6140_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58138B2C-37AC-48DD-9B45-19B2062EFD39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD7D153-24DD-42B8-85DD-BAD9F073DB75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6140m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D8E25B-C91A-408C-BE7E-640518184CA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6140m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1ECBC7-BB8A-494E-AF84-4537ED605DFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6142_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF6CA76-6747-4AEE-82F4-7ECAF4FA3477",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6142:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4B4211-5D41-489F-90CD-D4433E327B5D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6142f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D987EDBB-1385-4613-9EEE-F2E0E5ECB97E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6142f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D438C9E-657F-406E-8BED-76B8A89CDEF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6144_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7641D6A-E7DF-4DD5-B7EA-E96FF867209D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6144:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "547F2F51-C9D7-4729-8E77-D6EC9234AE32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6146_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C556955-3BB3-46D8-9C59-66318719A8E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6146:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E2CF69-B958-4833-BD5B-D3FF51FEA5BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6148_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "351632F2-B56D-421D-ABDA-3F02040B8BA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6148:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D5041FF-046C-4DC5-B943-29024FEFCA3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6148f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "172E3226-074A-4A4A-B4EC-DAE60C2DCB49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6148f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64C9103A-B87D-4906-BE63-9E7CCF549B62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6150_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59D3154-52AC-41CE-B578-B504D8217E9C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02356D3B-CF1D-474D-9489-70C783FB240D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6152_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "702469D7-98CA-445F-B0E5-2731E2F834CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6152:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D190CA8-62DD-48C1-A2CF-5E4DD7087724",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_6154_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97F90DF0-D7E6-4F4B-ADD8-EFF15DF2B8CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_6154:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B557A9-22AA-4231-8181-A048BCDE559D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4108_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C37AE95-8451-4260-A245-F9867698766C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4108:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B73B8B0-2816-4769-AB49-6103C606220C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4109t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D77A9E-3271-41CF-9E0A-77237E3CCA27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4109t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02DE4F50-1762-43A6-9B23-E777AEAC9BB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4110_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E0AEBC-640B-45DB-8062-9BCBF6F78E23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A4F8AB-65B9-4C1E-AE94-D6354BBB92BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4112_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBF7470-5EE3-48FE-90D4-B18E8902F84A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4112:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "580EE4F4-8F7A-4DEA-A6D5-17EE07223F1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4114_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2381BA-717C-465F-ACB2-F751B8DB558B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4114:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A77EDB9-F4AF-4F1E-A89B-CC3C8348E3FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4114t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF44B3B6-CBCD-4F15-A717-8B06EBC737D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4114t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BB6D83-93B9-4998-AF65-B40C6305CB05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4116_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E808ECA-197A-4443-82EF-4A0F8E56D3E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4116:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26299DE8-DC9A-491B-B1B6-B8FE2A63C1E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_4116t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82805C40-0057-4DB2-86B1-CD1BD88A7E46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_4116t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E1FFF6A-6E39-49D6-B9F4-E052D17F2E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_3104_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB055DB1-7C17-4D9A-B634-B8306EF82085",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_3104:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BFD9456-BCA8-490C-9C5C-5B87740DBF8F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_3106_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "389172DD-3511-42C1-82E8-D3E552EF26CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15B3ADD-3D03-48EC-8CE6-31A3DB69AD0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de condiciones inapropiadas en la interfaz de modulaci\u00f3n de voltaje para algunos Intel\u00ae Xeon\u00ae Scalable Processors, puede habilitar a un usuario privilegiado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11139",
  "lastModified": "2024-11-21T04:20:36.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T19:15:13.190",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/Dec/28"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/Dec/28"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K42433061?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03969en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…