diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json index 959485530ee..84820c5b540 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json @@ -2,16 +2,40 @@ "id": "CVE-2021-22142", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T01:15:07.210", - "lastModified": "2023-11-22T03:36:37.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:43:20.167", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Kibana contains an embedded version of the Chromium browser that the Reporting feature uses to generate the downloadable reports. If a user with permissions to generate reports is able to render arbitrary HTML with this browser, they may be able to leverage known Chromium vulnerabilities to conduct further attacks. Kibana contains a number of protections to prevent this browser from rendering arbitrary content." + }, + { + "lang": "es", + "value": "Kibana contiene una versi\u00f3n integrada del navegador Chromium que la funci\u00f3n de informes utiliza para generar informes descargables. Si un usuario con permisos para generar informes puede representar HTML arbitrario con este navegador, es posible que pueda aprovechar las vulnerabilidades conocidas de Chromium para realizar m\u00e1s ataques. Kibana contiene una serie de protecciones para evitar que este navegador muestre contenido arbitrario." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "bressers@elastic.co", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "bressers@elastic.co", "type": "Secondary", @@ -46,14 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.13.0", + "matchCriteriaId": "59FC20DF-243E-4BC1-B48B-941728841B72" + } + ] + } + ] + } + ], "references": [ { "url": "https://discuss.elastic.co/t/elastic-stack-7-13-0-and-6-8-16-security-update/273964/1", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.elastic.co/community/security", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json index c94bc88fef2..badb4eed335 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json @@ -2,16 +2,40 @@ "id": "CVE-2021-22150", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T01:15:07.417", - "lastModified": "2023-11-22T03:36:37.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:53:40.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "It was discovered that a user with Fleet admin permissions could upload a malicious package. Due to using an older version of the js-yaml library, this package would be loaded in an insecure manner, allowing an attacker to execute commands on the Kibana server.\n" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que un usuario con permisos de administrador Fleet pod\u00eda cargar un paquete malicioso. Debido al uso de una versi\u00f3n anterior de la librer\u00eda js-yaml, este paquete se cargar\u00eda de forma insegura, lo que permitir\u00eda a un atacante ejecutar comandos en el servidor Kibana." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "bressers@elastic.co", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "bressers@elastic.co", "type": "Secondary", @@ -46,14 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.10.2", + "versionEndExcluding": "7.14.1", + "matchCriteriaId": "710E6018-59E8-41A0-A1FA-D398A75FB21B" + } + ] + } + ] + } + ], "references": [ { "url": "https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.elastic.co/community/security", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23820.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23820.json index 41c2fdd683d..9368f3b3415 100644 --- a/CVE-2022/CVE-2022-238xx/CVE-2022-23820.json +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23820.json @@ -2,23 +2,3022 @@ "id": "CVE-2022-23820", "sourceIdentifier": "psirt@amd.com", "published": "2023-11-14T19:15:10.473", - "lastModified": "2023-11-14T19:30:45.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:26:30.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Failure to validate the AMD SMM communication buffer\nmay allow an attacker to corrupt the SMRAM potentially leading to arbitrary\ncode execution.\n\n\n\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "No validar el b\u00fafer de comunicaci\u00f3n AMD SMM puede permitir que un atacante corrompa la SMRAM, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "49EAA849-EAF1-42C2-AEF6-85EE62F60476" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "E862E635-726E-458F-934C-85FF8189CF96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "758197F4-63EA-4F15-9755-EDD854AD4516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "302DF6B0-2486-4AB2-9E62-6132298478E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3464F1A7-9C5B-4607-92DA-8F71578A9293" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B6C694-A27F-41F4-BCFA-A343AB09B11B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "A2C1D5D1-1FE8-4B3D-AE2E-9CA7662AB22D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "0680BAF6-C360-4098-987E-46078CC6341F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C57001FC-06BC-42EB-A8C3-2D62880BDD06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "91AF598C-67B7-4A1B-8F0E-FB9F0C28EDE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "097C8A18-70DF-4F8E-98E1-AD9A024E756E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "27EE0623-E737-4ABC-9BD3-9E1DD2E54A96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "7F7F9604-0BAD-47E8-843A-CCF402A687D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "921681C0-D80C-48CC-83F4-49AD2D292E83" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "28960288-F72E-4A39-8BB1-B31B29C02BDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2E831901-DA08-4BA1-AB3E-01E720849B80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "686F6739-DD58-4F51-BD05-5EEB96905910" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "80D20ACD-BE11-46A5-B59E-25A607A5598D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6E959641-33BC-4222-B95D-F832AE1557CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "552C29CF-148A-4862-AACC-CA4B806C678B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CA0E03D0-1466-4D88-B789-5F31E99BA6B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "59BC9614-4FB0-48DC-BCC0-CA3249C64216" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2606810D-E7C6-4702-9F7A-00FAE5CB4F16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C3A3CCF5-6C42-4FCD-9350-E9EB108C622E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "7D108368-748D-4C46-9E62-9F7BB2BA0E72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "44E26EF4-D2A9-4531-86A0-ACBC1AA0D525" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E900D20C-C396-4595-B326-FE1CA9C0FDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B4FFF18E-E53C-4086-ABEF-C9BB220C0FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D0E72916-CD0C-4400-9DDA-318719794DAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9490DC50-E4EC-4738-B75B-B6539A23151D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A604FE06-7DCF-4101-A22E-B3E7E7D4AED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "15113C05-4948-4CA4-A3FE-0044C4BF4A72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B7BB1696-E080-489F-A4BA-263034BD39EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8D4CE5F8-8E5D-44B6-BAA6-485B07A907C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "931D3D8C-39FA-42B9-BBCF-1831AA544DF6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "309EC7B9-8C3A-4D00-BB09-02BF8DB3E784" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "E36CB6BC-D9EC-4EB4-8D01-F7522A4EE72F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "5854BE52-11B0-40D3-9E8C-3F31AFF27265" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_56003xd_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CF4FC662-0ED9-45D8-BBCF-815E5C598018" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_56003xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7512B09-ED73-4E25-98ED-165FBC353577" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "35E4B926-B20E-418B-BD2B-7F635177E5CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D161262C-931E-4459-9E96-81A476F02C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CFF055F2-6DFA-40E3-A0F7-56811BB733BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_55003xd_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "64379024-B9FA-4732-AC4D-5B0919FD0313" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_56003xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7512B09-ED73-4E25-98ED-165FBC353577" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "66350DA5-A4E6-43A1-AFEC-245681B8019E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D161262C-931E-4459-9E96-81A476F02C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "721883DD-F39A-4BE1-B467-3F99C6B9D837" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8CCF03FB-F2AE-4039-B44C-57E287CB7A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "817D712C-275C-4329-8BC1-5AE493F98104" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "AF541067-52E1-430E-A17C-C0C77280B55E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "783064D1-8286-4873-8627-59F1311C1299" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0B36BD47-A549-4D8A-BAA0-66AD4291890D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C50D5EE8-541E-4EB6-AF90-D02C9FAC1314" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "466EDBD1-277B-422B-94A4-9D184009EEDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "44FB8C14-5F9C-4407-A379-F63833D26C90" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "96AAA390-E646-40E8-8072-33E7FC110AB8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0784513B-F4E0-40BA-9196-BB06173E9FC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "1C8FC243-A024-4461-B7D1-7B2C7F952923" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE995CB-E6B2-4126-8AC9-3F5A2888B2BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "695415D2-8221-4CF1-BF6A-5D1F45678325" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "41E233F8-C4FD-46AD-8C3B-71220400F679" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8AE6C421-47E2-4CB7-A249-B0C16162E2F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1C268E0-A5A2-4A70-917D-00BBF295C15F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C165E73E-2628-4A27-94AA-105514DCE05C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "AC5234C4-C514-49CE-97DD-090F8A404182" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "19A3832B-A799-4171-ADBF-75E28449B25F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_3015e_firmware:pollockpi-ft5_1.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "9F57E3F2-4C74-46C6-9F22-D54D0D6469CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_3015e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7806F15-EEF7-4C0B-9CBE-1DAB80213FC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_3015ce_firmware:pollockpi-ft5_1.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "76B3D2E0-72A3-4B46-AE4E-0032D7CD69AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_3015ce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31190A28-6142-4502-BD95-FD3792BED505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "8F19B76B-34B5-454B-B84B-E674C57A232D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D04CF84C-9373-4E3A-BD00-702238E1370D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "3799E57A-C0C9-4F12-93A6-6B74BD131B70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "780F2A91-08F7-41E5-B0F0-01654B039CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "B8735289-8872-479D-94CA-8030837C024D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "F2EA6956-D533-4EC3-A97B-F2E70012F3CC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "BD86142E-7486-40B0-B6A2-51B613AE162D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BF432D-B963-4F13-B9CF-8BBA58B16070" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "A15978A2-2BF1-4329-B01C-FDC350BD8A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D58EE8C4-F1EE-46DC-8BE8-34CE07AB8533" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "C8CA8772-15DF-4B02-B156-DBF559BA7A5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9AA6F528-80B7-4F6D-B1AD-7A50B7F24F70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "A7E86B53-802D-4B7C-BAAC-6B958DF4933A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800hs_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "BE27C612-E106-4C1B-98FC-9E4D16172E04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E8809F9B-CDFC-4EB4-99F8-4AA5073EB885" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "22D3A752-9301-4A82-ACFC-685C09267DB3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "202F8C05-4381-478E-963E-F7A5FB59AD2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4980u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "D63BFB39-B2EE-409B-83CE-61B87EEBEC3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E6540200-2BE0-40C5-A85A-DD495BB75524" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600hs_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4DDAB01F-1D55-4930-9B45-776B99723AD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "74DF7623-1CC6-43DA-B547-B5B36A8FCDF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "BE8431DC-EF02-47FB-9AA5-1A239C2B8C21" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4680u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6F1E99D3-267F-4033-8D85-683D19B353F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3122CF0B-56F8-4251-972E-5C434AA876E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "3C271A31-C3BA-454F-AC6E-1262247EA7D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "4AC5D617-0F60-4AB8-9467-32FB48437D60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "F40520F9-9C40-4FEE-9190-382F8A3D0DA8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "DA660DD4-6F01-4023-9F14-4459A802309E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "6F4E437F-8812-4448-B599-03D8B07A7714" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "0FDBC3E9-8CAB-4B9F-9AE9-10A86386F04C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "A5094610-5B3E-4649-9360-974A609869FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "F9CD9A94-B404-402A-ABCE-D6C94E3304CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "4BAA38A1-6646-4916-89BF-6E83EB66F8C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "A9B2C90F-67B5-4B50-A3B5-D822C6CD5680" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "2C6EE1C8-4AE3-4FB0-9B88-141FD074BCDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "C9622794-C04F-4FBC-8738-6CABE12B7998" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "C328BCF1-97B5-4FBE-BB7B-EF522703A205" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "638FA8F5-BE32-4BDF-8BCB-A287E6DD4127" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "61845787-E88F-4FCC-B7AB-B8A7DDB6A6DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "E0FA311E-64D4-44F7-AD15-54D3EC73DE1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "38A4CBCE-5AE4-423D-B95F-1DB7DB3EFF6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "97F46F69-7F64-49BF-BE8D-ACE6E1D9517A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "58872A65-AA91-4BA4-B29C-FB0BA5C0C0B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "36784FC7-1F12-4C29-8C2F-EC102DAEA05F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "60C12DEE-E176-421F-9998-62EB422A0A28" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F02976-2825-42B8-9B8C-F1EC58A2AD41" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A184AF86-F913-4947-BBF7-486ECA3E3C76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1FF50D-09F9-4C6B-8526-C2AAB02B799F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1D9357F7-F5DD-4EA0-A84A-4A163B7363E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "978C431B-75E2-4D88-9C96-F54BFE8363A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0BABC806-ED40-4BED-A0B1-690F022C6BF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_7335u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2FBC1C-673C-4BFD-98FE-51925DFC0941" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7535u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C01E8833-D236-4B9D-952E-1941BD8A7266" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0F338A61-CD40-4ACB-96C5-5FCB0851F36C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7735u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "BF987395-947B-4541-9F6B-ACEDF762CB03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7736u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DCB55460-1272-4B10-B383-DBBEF2B0AFE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "67E7125F-6537-4CC9-BE1C-3D815E691415" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23821.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23821.json index 464648ab131..a864d5c415f 100644 --- a/CVE-2022/CVE-2022-238xx/CVE-2022-23821.json +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23821.json @@ -2,19 +2,3096 @@ "id": "CVE-2022-23821", "sourceIdentifier": "psirt@amd.com", "published": "2023-11-14T19:15:10.520", - "lastModified": "2023-11-14T19:30:45.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:24:11.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en System Management Mode (SMM) puede permitir que un atacante escriba en la ROM SPI, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "49EAA849-EAF1-42C2-AEF6-85EE62F60476" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "E862E635-726E-458F-934C-85FF8189CF96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "758197F4-63EA-4F15-9755-EDD854AD4516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "302DF6B0-2486-4AB2-9E62-6132298478E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3464F1A7-9C5B-4607-92DA-8F71578A9293" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B6C694-A27F-41F4-BCFA-A343AB09B11B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "A2C1D5D1-1FE8-4B3D-AE2E-9CA7662AB22D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "0680BAF6-C360-4098-987E-46078CC6341F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C57001FC-06BC-42EB-A8C3-2D62880BDD06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "91AF598C-67B7-4A1B-8F0E-FB9F0C28EDE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "097C8A18-70DF-4F8E-98E1-AD9A024E756E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "27EE0623-E737-4ABC-9BD3-9E1DD2E54A96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "7F7F9604-0BAD-47E8-843A-CCF402A687D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "921681C0-D80C-48CC-83F4-49AD2D292E83" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "28960288-F72E-4A39-8BB1-B31B29C02BDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2E831901-DA08-4BA1-AB3E-01E720849B80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "686F6739-DD58-4F51-BD05-5EEB96905910" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "80D20ACD-BE11-46A5-B59E-25A607A5598D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6E959641-33BC-4222-B95D-F832AE1557CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "552C29CF-148A-4862-AACC-CA4B806C678B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CA0E03D0-1466-4D88-B789-5F31E99BA6B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "59BC9614-4FB0-48DC-BCC0-CA3249C64216" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2606810D-E7C6-4702-9F7A-00FAE5CB4F16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C3A3CCF5-6C42-4FCD-9350-E9EB108C622E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "7D108368-748D-4C46-9E62-9F7BB2BA0E72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "44E26EF4-D2A9-4531-86A0-ACBC1AA0D525" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E900D20C-C396-4595-B326-FE1CA9C0FDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B4FFF18E-E53C-4086-ABEF-C9BB220C0FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D0E72916-CD0C-4400-9DDA-318719794DAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9490DC50-E4EC-4738-B75B-B6539A23151D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A604FE06-7DCF-4101-A22E-B3E7E7D4AED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "15113C05-4948-4CA4-A3FE-0044C4BF4A72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B7BB1696-E080-489F-A4BA-263034BD39EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8D4CE5F8-8E5D-44B6-BAA6-485B07A907C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "931D3D8C-39FA-42B9-BBCF-1831AA544DF6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "309EC7B9-8C3A-4D00-BB09-02BF8DB3E784" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "E36CB6BC-D9EC-4EB4-8D01-F7522A4EE72F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "5854BE52-11B0-40D3-9E8C-3F31AFF27265" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_56003xd_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CF4FC662-0ED9-45D8-BBCF-815E5C598018" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_56003xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7512B09-ED73-4E25-98ED-165FBC353577" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "35E4B926-B20E-418B-BD2B-7F635177E5CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D161262C-931E-4459-9E96-81A476F02C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CFF055F2-6DFA-40E3-A0F7-56811BB733BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_55003xd_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "64379024-B9FA-4732-AC4D-5B0919FD0313" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_56003xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7512B09-ED73-4E25-98ED-165FBC353577" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "66350DA5-A4E6-43A1-AFEC-245681B8019E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D161262C-931E-4459-9E96-81A476F02C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "721883DD-F39A-4BE1-B467-3F99C6B9D837" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8CCF03FB-F2AE-4039-B44C-57E287CB7A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "817D712C-275C-4329-8BC1-5AE493F98104" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "AF541067-52E1-430E-A17C-C0C77280B55E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "783064D1-8286-4873-8627-59F1311C1299" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0B36BD47-A549-4D8A-BAA0-66AD4291890D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C50D5EE8-541E-4EB6-AF90-D02C9FAC1314" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:comboam4_pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "466EDBD1-277B-422B-94A4-9D184009EEDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "44FB8C14-5F9C-4407-A379-F63833D26C90" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "96AAA390-E646-40E8-8072-33E7FC110AB8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0784513B-F4E0-40BA-9196-BB06173E9FC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "1C8FC243-A024-4461-B7D1-7B2C7F952923" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:summitpi-sp3r2_1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE995CB-E6B2-4126-8AC9-3F5A2888B2BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "695415D2-8221-4CF1-BF6A-5D1F45678325" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "41E233F8-C4FD-46AD-8C3B-71220400F679" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8AE6C421-47E2-4CB7-A249-B0C16162E2F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1C268E0-A5A2-4A70-917D-00BBF295C15F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C165E73E-2628-4A27-94AA-105514DCE05C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "AC5234C4-C514-49CE-97DD-090F8A404182" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:castlepeakpi-sp3r2_1.1.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "19A3832B-A799-4171-ADBF-75E28449B25F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "51FC48F1-72CE-4264-A980-16D6AE9396CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "01A65579-FD3C-4CDB-B74E-1E90FC110D8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "B24A60E9-0A4E-443F-ACF3-A9390165AE32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_3015e_firmware:pollockpi-ft5_1.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "9F57E3F2-4C74-46C6-9F22-D54D0D6469CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_3015e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7806F15-EEF7-4C0B-9CBE-1DAB80213FC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_3015ce_firmware:pollockpi-ft5_1.0.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "76B3D2E0-72A3-4B46-AE4E-0032D7CD69AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_3015ce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31190A28-6142-4502-BD95-FD3792BED505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "8F19B76B-34B5-454B-B84B-E674C57A232D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D04CF84C-9373-4E3A-BD00-702238E1370D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "3799E57A-C0C9-4F12-93A6-6B74BD131B70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "780F2A91-08F7-41E5-B0F0-01654B039CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "B8735289-8872-479D-94CA-8030837C024D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "F2EA6956-D533-4EC3-A97B-F2E70012F3CC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "BD86142E-7486-40B0-B6A2-51B613AE162D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BF432D-B963-4F13-B9CF-8BBA58B16070" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "A15978A2-2BF1-4329-B01C-FDC350BD8A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D58EE8C4-F1EE-46DC-8BE8-34CE07AB8533" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "C8CA8772-15DF-4B02-B156-DBF559BA7A5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9AA6F528-80B7-4F6D-B1AD-7A50B7F24F70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "A7E86B53-802D-4B7C-BAAC-6B958DF4933A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800hs_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "BE27C612-E106-4C1B-98FC-9E4D16172E04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E8809F9B-CDFC-4EB4-99F8-4AA5073EB885" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "22D3A752-9301-4A82-ACFC-685C09267DB3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "202F8C05-4381-478E-963E-F7A5FB59AD2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4980u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "D63BFB39-B2EE-409B-83CE-61B87EEBEC3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E6540200-2BE0-40C5-A85A-DD495BB75524" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600hs_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4DDAB01F-1D55-4930-9B45-776B99723AD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "74DF7623-1CC6-43DA-B547-B5B36A8FCDF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "BE8431DC-EF02-47FB-9AA5-1A239C2B8C21" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4680u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6F1E99D3-267F-4033-8D85-683D19B353F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3122CF0B-56F8-4251-972E-5C434AA876E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "3C271A31-C3BA-454F-AC6E-1262247EA7D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "4AC5D617-0F60-4AB8-9467-32FB48437D60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "F40520F9-9C40-4FEE-9190-382F8A3D0DA8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "DA660DD4-6F01-4023-9F14-4459A802309E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "6F4E437F-8812-4448-B599-03D8B07A7714" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "0FDBC3E9-8CAB-4B9F-9AE9-10A86386F04C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "A5094610-5B3E-4649-9360-974A609869FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "F9CD9A94-B404-402A-ABCE-D6C94E3304CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "4BAA38A1-6646-4916-89BF-6E83EB66F8C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "A9B2C90F-67B5-4B50-A3B5-D822C6CD5680" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "2C6EE1C8-4AE3-4FB0-9B88-141FD074BCDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "C9622794-C04F-4FBC-8738-6CABE12B7998" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "C328BCF1-97B5-4FBE-BB7B-EF522703A205" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "638FA8F5-BE32-4BDF-8BCB-A287E6DD4127" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "61845787-E88F-4FCC-B7AB-B8A7DDB6A6DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "E0FA311E-64D4-44F7-AD15-54D3EC73DE1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", + "matchCriteriaId": "38A4CBCE-5AE4-423D-B95F-1DB7DB3EFF6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "97F46F69-7F64-49BF-BE8D-ACE6E1D9517A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "58872A65-AA91-4BA4-B29C-FB0BA5C0C0B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "36784FC7-1F12-4C29-8C2F-EC102DAEA05F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "60C12DEE-E176-421F-9998-62EB422A0A28" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F02976-2825-42B8-9B8C-F1EC58A2AD41" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A184AF86-F913-4947-BBF7-486ECA3E3C76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1FF50D-09F9-4C6B-8526-C2AAB02B799F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1D9357F7-F5DD-4EA0-A84A-4A163B7363E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "978C431B-75E2-4D88-9C96-F54BFE8363A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0BABC806-ED40-4BED-A0B1-690F022C6BF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_7335u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2FBC1C-673C-4BFD-98FE-51925DFC0941" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7535u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C01E8833-D236-4B9D-952E-1941BD8A7266" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0F338A61-CD40-4ACB-96C5-5FCB0851F36C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7735u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "BF987395-947B-4541-9F6B-ACEDF762CB03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7736u_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DCB55460-1272-4B10-B383-DBBEF2B0AFE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:rembrandtpi-fp7_1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "67E7125F-6537-4CC9-BE1C-3D815E691415" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36013.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36013.json index ae6470c62f7..44a0c318d12 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36013.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36013.json @@ -2,16 +2,40 @@ "id": "CVE-2023-36013", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-20T16:15:08.080", - "lastModified": "2023-11-20T19:18:51.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T17:55:52.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "PowerShell Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de PowerShell" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -34,10 +58,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2", + "versionEndExcluding": "7.2.17", + "matchCriteriaId": "B9E6D5F8-C114-4A82-AC63-EDC0E7A53F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3", + "versionEndExcluding": "7.3.10", + "matchCriteriaId": "F68087FE-5627-4158-9EE4-3E7035D0D1B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36013", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42006.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42006.json new file mode 100644 index 00000000000..6ae77688d11 --- /dev/null +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42006.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-42006", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-01T17:15:07.297", + "lastModified": "2023-12-01T17:15:07.297", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Administration Runtime Expert for i 7.2, 7.3, 7.4, and 7.5 could allow a local user to obtain sensitive information caused by improper authority checks. IBM X-Force ID: 265266." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265266", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7085891", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43757.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43757.json index 069e86f8ad8..090cb49f232 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43757.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43757.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43757", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-11-16T07:15:08.600", - "lastModified": "2023-11-16T13:51:19.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:45:24.070", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,23 +14,990 @@ "value": "Vulnerabilidad de fuerza de cifrado inadecuada en m\u00faltiples routers proporcionados por ELECOM CO.,LTD. y LOGITEC CORPORATION permite que un atacante no autenticado adyacente a la red adivine la clave de cifrado utilizada para la comunicaci\u00f3n LAN inal\u00e1mbrica e intercepte la comunicaci\u00f3n. En cuanto a los productos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor en la secci\u00f3n [Referencias]." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-2533ghbk2-t_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "416614AE-FE5E-4807-8AB0-618F46E48C4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-2533ghbk2-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "991548FF-6EAD-422F-B2CF-316E96FB7F6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-2533ghbk-i_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65FF48A0-3059-4969-9C7D-D12B1E164DE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-2533ghbk-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDD11C2A-1EC2-420D-B2AE-FEB67E9866FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-1750ghbk2-i_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68DEE867-A37C-4199-BE44-222706725533" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-1750ghbk2-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1EAF366-E7EB-4864-BB1C-16D828141CFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-1750ghbk-e_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AE44EDE-A5BD-486D-9225-A44BAAB39132" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-1750ghbk-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB8292C-ABDA-4F61-8EF1-D498AE3BF66C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-1750ghbk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6E65402-982D-4E0D-A257-806118DBE50A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-1750ghbk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D1F1675-60C1-4150-8306-1592F88D3DAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-1167ghbk2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D00FC11-2C8D-4B88-BB15-157F9C7DBA88" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-1167ghbk2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DF1D75E-EF09-4BF7-AC5C-F6CDC5B6ED8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-1167ghbk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F2F7444-D3CE-4C5B-B021-4EA615442478" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-1167ghbk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69B25FE-0AF4-49CC-9F10-8F98AFF7CCBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-f1167acf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F558FC-55E4-4DF5-B01D-319A03CE0814" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-f1167acf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C244EA13-D45C-4968-A330-3AD80F588537" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-733ghbk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE82FE52-F2A1-4B9D-B618-7B8D82C497A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-733ghbk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED2A27DD-B40D-4415-8CCE-063427864910" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-733ghbk-i_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E9761CF-F0A3-4ACF-B7C0-8BF6EB5F8408" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-733ghbk-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1900274E-7B26-4183-8912-70BCCC306FF8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-733ghbk-c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB404C76-CCEB-4242-B602-8A4F93C9F3FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-733ghbk-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED75E24-5232-4CD1-A8D5-96ECCC3C1D17" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-300ghbk2-i_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A5AC4E-6AC5-4CF7-ADAC-4DD51ABF1F4D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-300ghbk2-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A85134B-286A-472B-B0D2-C4FE7F5B7FC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-300ghbk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17D60C3E-D822-4A09-B9EA-8FBA94DEEC0B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-300ghbk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FD708BA-8E44-45C9-90A9-2CDA33CFA291" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-733febk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE17625-486F-40E4-9067-07139B69281D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-733febk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2152FA45-F61F-4347-B9B3-992C994D1B64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-300febk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBA18046-201B-4009-BE58-B2457DCF206A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-300febk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AD07548-B957-4275-BE59-F40940E078A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrc-f300nf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6278262-98AD-4D51-B368-C8B7C47F4510" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrc-f300nf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF251645-9505-49CC-BA4D-1CA454D639D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300wh-h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C616FACD-FD5F-4CE3-A196-3447A0D8B5D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300wh-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "079F2DC5-840A-4201-B46C-F9339968D256" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300bk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FF22457-912C-4818-B31E-DCBDF60E6A19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300bk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89ED96E9-D73D-42E7-A86F-7A73E00D2B86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300wh_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D59399A-BE39-4E30-BF0F-8EBADD179279" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300wh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E458D9A1-C2AF-4A8F-AC52-8A9D25C303ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300rd_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DFD59C-AAF4-4B14-A6D5-4CC8D436FDC2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300rd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5398598E-4579-44DF-95FB-EBB2871A248E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300sv_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1E84D55-C80A-4813-AA15-2E67E1B849C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300sv:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D4159F7-1DF3-4827-9784-E338CC3E7D93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300bk-s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "221C60DE-F1B0-4284-87DB-EE22B137B16E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300bk-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85EB981B-03EA-49B3-99EA-A8389F795C63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300wh-s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "814F1554-9070-4439-BDD0-379596B6710C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300wh-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "887859FA-3FA7-40E4-BE7B-977C66CF4E37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300bk2-s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C8ABEA4-95AB-4B17-BA47-8FC17B62CB6E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300bk2-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "476D444E-3A59-4A46-975C-C33AC3F1BB7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-300wh2-s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E429963F-D7D0-46A0-BD2D-98BD6A9F5348" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-300wh2-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C383661F-19E5-4976-BAC2-1077B67D12A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-h300bk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641FC18A-D8A1-49BB-99D3-C4649B420686" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-h300bk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99341BF6-FD30-421A-9E9C-32C99B6F75AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-h300wh_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F58AC396-DE39-4BD2-9E0E-46950312ABD0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-h300wh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8C25CFC-393E-4487-965F-8F922723346F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-150bk_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B42DDDAA-92A9-4D41-9369-A163D6045B15" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-150bk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D11F66F-CEEA-42AB-B1E1-B569FB08B0F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:wrh-150wh_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "378E5102-178F-4C8D-8C0B-CCCF9769A381" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:wrh-150wh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E8082CE-18E8-438F-B953-D5EF1A27FE0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:lan-w300n\\/rs_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AAF4C0E-F270-4062-925E-38C65F7280A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:lan-w300n\\/rs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0032270C-53E3-4A46-95A8-FDE5DEFDC75C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:lan-w301nr_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE6896F9-6B59-4420-AB70-21B8B84C3B38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:lan-w301nr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A667CE5-0926-4986-B9F6-0F2C23F70FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:lan-w300n\\/p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0376434A-D083-4F7C-9BB1-A9F58F86D3A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:lan-w300n\\/p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAD881BC-A228-4402-8A09-5E862B448A62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:lan-wh300n\\/dgp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F5C8E61-367D-40AE-B37D-F1CED982DAD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:lan-wh300n\\/dgp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B27DECBE-877C-4888-A4B0-C0A65A590640" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:elecom:lan-wh300ndgpe_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0870306-5179-4477-8C88-EDFC507ED3D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:elecom:lan-wh300ndgpe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FE6693-2075-4A08-9ACC-4564A36A16BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU94119876/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.elecom.co.jp/news/security/20210706-01/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.elecom.co.jp/news/security/20230810-01/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.elecom.co.jp/news/security/20231114-01/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4590.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4590.json index 0b104ee6eb1..4aa8398d894 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4590.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4590.json @@ -2,16 +2,40 @@ "id": "CVE-2023-4590", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-11-27T13:15:07.130", - "lastModified": "2023-11-27T13:52:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:53:07.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability in Frhed hex editor, affecting version 1.6.0. This vulnerability could allow an attacker to execute arbitrary code via a long filename argument through the Structured Exception Handler (SEH) registers." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desbordamiento del b\u00fafer en el editor hexadecimal Frhed, que afecta a la versi\u00f3n 1.6.0. Esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento de nombre de archivo largo a trav\u00e9s de los registros de Structured Exception Handler (SEH)." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "cve-coordination@incibe.es", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kimmov:frhed:1.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D87EC9FE-8229-46BD-AD8E-2D22788AAB66" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-vulnerability-frhed", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47263.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47263.json index 3958967791b..188b5a3e91b 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47263.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47263.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47263", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-16T03:15:07.290", - "lastModified": "2023-11-16T13:51:19.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T17:42:55.113", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,175 @@ "value": "Ciertos productos WithSecure permiten una Denegaci\u00f3n de Servicio (DoS) en el motor antivirus al escanear un archivo PE32 difuso. Esto afecta a: \nWithSecure Client Security 15, \nWithSecure Server Security 15, \nWithSecure Email and Server Security 15, \nWithSecure Elements Endpoint Protection 17 y posteriores, \nWithSecure Client Security for Mac 15, \nWithSecure Elements Endpoint Protection for Mac 17 y posteriores, \nWithSecure Linux Security 64 12.0, \nWithSecure Linux Protection 12.0, \nWithSecure Atlant (formerly F-Secure Atlant) 15 y posteriores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "1755AB17-E9C9-4616-98B4-843B75668CA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "matchCriteriaId": "B92950AC-F16B-4935-93D8-39E6DC6B0B5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "2E1B31DD-3C88-4826-8E24-588FED197C5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "015D02AD-F46F-46DF-9CD8-E0DB78CE17DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "1755AB17-E9C9-4616-98B4-843B75668CA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "matchCriteriaId": "B92950AC-F16B-4935-93D8-39E6DC6B0B5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:linux_protection:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA1C33E-551B-4CBF-A0C0-663A32611D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:linux_security_64:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ACBC6F42-8F62-4599-83F3-9E9147D46129" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:atlant:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "matchCriteriaId": "07CE65AD-1AEA-472D-BCBC-549CD3FA4208" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-47263", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47264.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47264.json index 770da056a0b..48895f57aae 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47264.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47264.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47264", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-16T03:15:07.347", - "lastModified": "2023-11-16T13:51:19.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:32:28.423", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,180 @@ "value": "Ciertos productos WithSecure tienen una sobrelectura del b\u00fafer por lo que el procesamiento de ciertos tipos de archivos fuzz puede provocar una denegaci\u00f3n de servicio (DoS). Esto afecta a: \nWithSecure Client Security 15, \nWithSecure Server Security 15, \nWithSecure Email and Server Security 15, \nWithSecure Elements Endpoint Protection 17 y posteriores, \nWithSecure Client Security for Mac 15, \nWithSecure Elements Endpoint Protection for Mac 17 y posteriores, \nWithSecure Linux Security 64 12.0, \nWithSecure Linux Protection 12.0, \nWithSecure Atlant (formerly F-Secure Atlant) 15 y posteriores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "1755AB17-E9C9-4616-98B4-843B75668CA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "matchCriteriaId": "B92950AC-F16B-4935-93D8-39E6DC6B0B5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "2E1B31DD-3C88-4826-8E24-588FED197C5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "015D02AD-F46F-46DF-9CD8-E0DB78CE17DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*", + "matchCriteriaId": "1755AB17-E9C9-4616-98B4-843B75668CA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "matchCriteriaId": "B92950AC-F16B-4935-93D8-39E6DC6B0B5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:linux_protection:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA1C33E-551B-4CBF-A0C0-663A32611D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:linux_security_64:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ACBC6F42-8F62-4599-83F3-9E9147D46129" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:atlant:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "matchCriteriaId": "07CE65AD-1AEA-472D-BCBC-549CD3FA4208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:withsecure:atlant:1.0.35-1:*:*:*:*:*:*:*", + "matchCriteriaId": "3BA1712F-D879-44CA-BCAD-49D6533D1E8E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-47264", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48706.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48706.json index 041c81650ff..1e12985b071 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48706.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48706.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48706", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-22T22:15:08.673", - "lastModified": "2023-11-24T15:24:57.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T17:54:29.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,26 +70,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.0.2121", + "matchCriteriaId": "F978DA02-FB07-40A0-BD9E-CAC3945B4E2D" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/11/22/3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://github.com/gandalf4a/crash_report/blob/main/vim/vim_huaf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/vim/vim/commit/26c11c56888d01e298cd8044caf860f3c26f57bb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/vim/vim/pull/13552", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49102.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49102.json index b7d6e1e1b24..8da45de3d96 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49102.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49102", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-22T22:15:08.867", - "lastModified": "2023-11-24T15:24:57.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T17:48:18.200", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "NZBGet 21.1 permite la ejecuci\u00f3n remota de c\u00f3digo autenticado porque los programas de descompresi\u00f3n (7za y unrar) conservan los permisos de los archivos ejecutables. Un atacante con capacidad de Control puede ejecutar un archivo estableciendo el valor de SevenZipCommand o UnrarCmd. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nzbget:nzbget:21.1:*:*:*:*:*:*:*", + "matchCriteriaId": "79CBD057-B313-47FE-95C3-A216BD116DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://nzbget.net/download", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://sec.maride.cc/posts/nzbget/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49321.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49321.json index 49da9a65a52..35da8849748 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49321.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49321.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49321", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-27T00:15:07.280", - "lastModified": "2023-11-28T19:15:07.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:10:56.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,174 @@ "value": "Ciertos productos WithSecure permiten una Denegaci\u00f3n de Servicio porque el escaneo de un archivo manipulado lleva mucho tiempo y hace que el esc\u00e1ner se cuelgue. Esto afecta a WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 y posteriores, WithSecure Client Security para Mac 15, WithSecure Elements Endpoint Protection for Mac 17 y posteriores, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, y WithSecure Atlant 1.0.35-1. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "96B5DD2D-9D5C-4475-8E8D-24950C7C5E84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BA4ED9C-9739-435C-940E-97D6B18F217A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*", + "matchCriteriaId": "17C9517C-5EAD-4039-A80F-934D658143DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "13507004-1DD0-4DB3-B152-DA23CE1317E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "matchCriteriaId": "F24DCDA1-6736-4CAC-A626-5871A6FEB283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "75B976BB-2359-472B-8A70-4B854C2E6749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "96BF356E-12D9-4E39-AFAE-E7B03C8D7700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "13507004-1DD0-4DB3-B152-DA23CE1317E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "matchCriteriaId": "F24DCDA1-6736-4CAC-A626-5871A6FEB283" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-49321", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49322.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49322.json index a4de4ce2d39..370329cd3c8 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49322.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49322.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49322", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-27T00:15:07.330", - "lastModified": "2023-11-28T19:15:07.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:25:57.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,174 @@ "value": "Ciertos productos WithSecure permiten una Denegaci\u00f3n de Servicio porque hay una falla en el controlador de descompresi\u00f3n que puede provocar una falla en el motor de escaneo. Esto afecta a WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 y posteriores, WithSecure Client Security para Mac 15, WithSecure Elements Endpoint Protection para Mac 17 y posteriores, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, y WithSecure Atlant 1.0.35-1. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "96B5DD2D-9D5C-4475-8E8D-24950C7C5E84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BA4ED9C-9739-435C-940E-97D6B18F217A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*", + "matchCriteriaId": "17C9517C-5EAD-4039-A80F-934D658143DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "13507004-1DD0-4DB3-B152-DA23CE1317E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "matchCriteriaId": "F24DCDA1-6736-4CAC-A626-5871A6FEB283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "75B976BB-2359-472B-8A70-4B854C2E6749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "96BF356E-12D9-4E39-AFAE-E7B03C8D7700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*", + "matchCriteriaId": "13507004-1DD0-4DB3-B152-DA23CE1317E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "matchCriteriaId": "F24DCDA1-6736-4CAC-A626-5871A6FEB283" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-49322", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5341.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5341.json index df862e4b01d..02dbb9a98b9 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5341.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5341.json @@ -2,16 +2,40 @@ "id": "CVE-2023-5341", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-19T10:15:49.433", - "lastModified": "2023-11-20T00:02:51.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T18:01:53.950", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A heap use-after-free flaw was found in coders/bmp.c in ImageMagick." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla de heap-use-after-free en coders/bmp.c en ImageMagick." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,18 +80,83 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.1.2", + "matchCriteriaId": "82459EA2-46DA-466E-8095-120474DAD7B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-5341", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241774", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6164.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6164.json index 8bfc414d993..6a9f4024a1a 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6164.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6164.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6164", "sourceIdentifier": "security@wordfence.com", "published": "2023-11-22T16:15:15.970", - "lastModified": "2023-11-22T17:31:47.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-01T17:05:55.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The MainWP Dashboard \u2013 WordPress Manager for Multiple Websites Maintenance plugin for WordPress is vulnerable to CSS Injection via the \u2018newColor\u2019 parameter in all versions up to, and including, 4.5.1.2 due to insufficient input sanitization. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary CSS values into the site tags." + }, + { + "lang": "es", + "value": "El complemento MainWP Dashboard \u2013 WordPress Manager for Multiple Websites Maintenance para WordPress es vulnerable a la inyecci\u00f3n de CSS a trav\u00e9s del par\u00e1metro 'newColor' en todas las versiones hasta la 4.5.1.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente. Esto hace posible que atacantes autenticados, con acceso a nivel de administrador, inyecten valores CSS arbitrarios en las etiquetas del sitio." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -34,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mainwp:mainwp:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.5.1.2", + "matchCriteriaId": "5022351F-FCEE-4A33-886C-40544C432C0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/mainwp/tags/4.5.1.2&old=2996628&new_path=/mainwp/tags/4.5.1.3&new=2996628&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73980a90-bb17-46e4-a0ea-691f80500fe3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json index 9e46223daeb..844bf916477 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6438", "sourceIdentifier": "cna@vuldb.com", "published": "2023-11-30T17:15:13.223", - "lastModified": "2023-11-30T17:30:19.207", + "lastModified": "2023-12-01T17:15:07.480", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as problematic has been found in IceCMS 2.0.1. Affected is an unknown function of the file /WebArticle/articles/ of the component Like Handler. The manipulation leads to improper enforcement of a single, unique action. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246438 is the identifier assigned to this vulnerability." + "value": "A vulnerability classified as problematic has been found in Thecosy IceCMS 2.0.1. Affected is an unknown function of the file /WebArticle/articles/ of the component Like Handler. The manipulation leads to improper enforcement of a single, unique action. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246438 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en IceCMS 2.0.1 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /WebArticle/articles/ del componente Like Handler es afectado por esta vulnerabilidad. La manipulaci\u00f3n conduce a la ejecuci\u00f3n inadecuada de una acci\u00f3n \u00fanica y \u00fanica. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-246438 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/README.md b/README.md index cce7906558a..8f6a44e373c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-01T17:00:18.687743+00:00 +2023-12-01T19:00:20.325100+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-01T16:56:41.467000+00:00 +2023-12-01T18:53:40.177000+00:00 ``` ### Last Data Feed Release @@ -29,36 +29,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231955 +231956 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `1` -* [CVE-2023-45168](CVE-2023/CVE-2023-451xx/CVE-2023-45168.json) (`2023-12-01T15:15:07.623`) -* [CVE-2023-49371](CVE-2023/CVE-2023-493xx/CVE-2023-49371.json) (`2023-12-01T15:15:07.817`) -* [CVE-2023-4518](CVE-2023/CVE-2023-45xx/CVE-2023-4518.json) (`2023-12-01T15:15:07.860`) -* [CVE-2023-48813](CVE-2023/CVE-2023-488xx/CVE-2023-48813.json) (`2023-12-01T16:15:07.487`) -* [CVE-2023-48842](CVE-2023/CVE-2023-488xx/CVE-2023-48842.json) (`2023-12-01T16:15:07.550`) -* [CVE-2023-48893](CVE-2023/CVE-2023-488xx/CVE-2023-48893.json) (`2023-12-01T16:15:07.607`) +* [CVE-2023-42006](CVE-2023/CVE-2023-420xx/CVE-2023-42006.json) (`2023-12-01T17:15:07.297`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `16` -* [CVE-2023-48304](CVE-2023/CVE-2023-483xx/CVE-2023-48304.json) (`2023-12-01T15:08:42.693`) -* [CVE-2023-24415](CVE-2023/CVE-2023-244xx/CVE-2023-24415.json) (`2023-12-01T15:15:07.503`) -* [CVE-2023-6021](CVE-2023/CVE-2023-60xx/CVE-2023-6021.json) (`2023-12-01T15:22:19.813`) -* [CVE-2023-6020](CVE-2023/CVE-2023-60xx/CVE-2023-6020.json) (`2023-12-01T15:22:23.380`) -* [CVE-2023-6019](CVE-2023/CVE-2023-60xx/CVE-2023-6019.json) (`2023-12-01T15:22:26.807`) -* [CVE-2023-49104](CVE-2023/CVE-2023-491xx/CVE-2023-49104.json) (`2023-12-01T16:03:59.827`) -* [CVE-2023-2438](CVE-2023/CVE-2023-24xx/CVE-2023-2438.json) (`2023-12-01T16:07:56.973`) -* [CVE-2023-2440](CVE-2023/CVE-2023-24xx/CVE-2023-2440.json) (`2023-12-01T16:11:41.727`) -* [CVE-2023-47630](CVE-2023/CVE-2023-476xx/CVE-2023-47630.json) (`2023-12-01T16:24:28.727`) -* [CVE-2023-38435](CVE-2023/CVE-2023-384xx/CVE-2023-38435.json) (`2023-12-01T16:28:34.823`) -* [CVE-2023-41442](CVE-2023/CVE-2023-414xx/CVE-2023-41442.json) (`2023-12-01T16:56:41.467`) +* [CVE-2021-22142](CVE-2021/CVE-2021-221xx/CVE-2021-22142.json) (`2023-12-01T18:43:20.167`) +* [CVE-2021-22150](CVE-2021/CVE-2021-221xx/CVE-2021-22150.json) (`2023-12-01T18:53:40.177`) +* [CVE-2022-23821](CVE-2022/CVE-2022-238xx/CVE-2022-23821.json) (`2023-12-01T18:24:11.730`) +* [CVE-2022-23820](CVE-2022/CVE-2022-238xx/CVE-2022-23820.json) (`2023-12-01T18:26:30.530`) +* [CVE-2023-6164](CVE-2023/CVE-2023-61xx/CVE-2023-6164.json) (`2023-12-01T17:05:55.893`) +* [CVE-2023-6438](CVE-2023/CVE-2023-64xx/CVE-2023-6438.json) (`2023-12-01T17:15:07.480`) +* [CVE-2023-47263](CVE-2023/CVE-2023-472xx/CVE-2023-47263.json) (`2023-12-01T17:42:55.113`) +* [CVE-2023-49102](CVE-2023/CVE-2023-491xx/CVE-2023-49102.json) (`2023-12-01T17:48:18.200`) +* [CVE-2023-48706](CVE-2023/CVE-2023-487xx/CVE-2023-48706.json) (`2023-12-01T17:54:29.457`) +* [CVE-2023-36013](CVE-2023/CVE-2023-360xx/CVE-2023-36013.json) (`2023-12-01T17:55:52.290`) +* [CVE-2023-5341](CVE-2023/CVE-2023-53xx/CVE-2023-5341.json) (`2023-12-01T18:01:53.950`) +* [CVE-2023-49321](CVE-2023/CVE-2023-493xx/CVE-2023-49321.json) (`2023-12-01T18:10:56.007`) +* [CVE-2023-49322](CVE-2023/CVE-2023-493xx/CVE-2023-49322.json) (`2023-12-01T18:25:57.977`) +* [CVE-2023-47264](CVE-2023/CVE-2023-472xx/CVE-2023-47264.json) (`2023-12-01T18:32:28.423`) +* [CVE-2023-43757](CVE-2023/CVE-2023-437xx/CVE-2023-43757.json) (`2023-12-01T18:45:24.070`) +* [CVE-2023-4590](CVE-2023/CVE-2023-45xx/CVE-2023-4590.json) (`2023-12-01T18:53:07.967`) ## Download and Usage