Refine your search
108 vulnerabilities found for by Intel
CVE-2024-8105 (GCVE-0-2024-8105)
Vulnerability from cvelistv5
Published
2024-08-26 19:15
Modified
2025-08-25 21:48
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Acer | vz2694g |
Version: d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-30T16:02:49.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/455367"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-8105",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-09T20:18:46.069299Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-09T20:21:06.044Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "vz2694g",
"vendor": "Acer",
"versions": [
{
"lessThan": "0",
"status": "affected",
"version": "d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6",
"versionType": "sha256sum"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s 27",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "2bd2bfaf79a72eaca45e544e5c6a5bb842b292bdc229b8975b3101a4013e0d5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s32-1856",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "29837e239487cc83818a7f40f9280d9692a50376487899edd603494b0f30e4c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire xc-1710",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "cdaa406bda1a58fbe9933622dec218a26f79871d42f0d3576fbf878e51a16201"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-1655",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "399f68dc94a6c42030efcd57fd034ff721f860b7b5d447779e7a6a6c99aba34f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire c22-1600",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "d938d08543d35d4249a51057c1d9c62bb1f6440af19913c5feffcea47dd3de95"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-962",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "3d525f96f63995c51ab1bcd2c50ebb71661ffeca9f78f97cc97e851d0e2bbbdd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680 f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "a2679a9595a104d70bddc024dbc4f65f0dc9d906f30a0d1ae6b996b14246a6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680s f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "e5fdaabf11b236c5c7b040d674936e84db746a180ab9999317e16dcb77aeeba4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iAPLx-DE(TAA30 TEST)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "94c6f84946db100b505af8a308f69ef6cddc2e310b50641a6e2e63bc9aed54e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iKBLMUx-DER(Volta Charging)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "fcd339e12730f057e41ad41228f9612d4954f2d0dbcfeef37e14dcdaf2866e05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3510-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7fbfd8b03d178e074572dff764f28af98c87c7556ce3837ccb8dfe993efa1940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x17-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "65f5939878deede2e1b24a6412ba025b78f45b1562e9d365d97e1c76a32a1832"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r4-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f75b595b9ce5e1e25a5d64e54edffdf696251b4f4e860c0d3a03a183631f090e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x14-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "620848eeadb74a572d6400672aecca35f46dfdc7b5152bb028fbcbf74ea7bccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-amd-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6348442334e85e8374884ea848685771053a7cf274ccb77559c710b5a00f61e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r3-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "413a04c12bde19f1f97d9d334ed57197f0405f9f10ab7154d2b71e5471577c97"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-area51m-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "253743e7a39d0b709122c5329799f4c4608536eeb632218e7f0cbe1f6e8b5db8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x15-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4fc54067f263791aed2fa4b57b226ea15c4eb0f55b3797e002bb62aa936bdd8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3521-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e2242e4aa3a284fcbbcf2f38a10bec24408f1eff74bb307e699ea46f483359f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r11-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "8f79d9de33f5f131226a78ccb10bb16218a5be51b2105cc32e38ceb0c8c30e9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3502-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "62c02a9b5a4d4328ac41c3e3aa7757e64e6c5cd52b9e047333ad18e60d17fcb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r13-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "dc5912033c5ca14475f2d59ca47f25c8840f362f0c8553d13bb06a8e47c42abf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8950-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6982be0bd8e1aed1251fe5300eec2b515b7cab70e761cfb72074f5d658d092d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7e310dca802db0f7a22d39bb2d7d5b79c7e9df8e5698f0e691942ec334ce5794"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r14-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "26a447a94e96fa8d9c590888cae490750c32d5af95faece3595f21efc41c1f2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r16-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "06a9dffc8fb3edafd1b6377cf38879860a0ae3c87f97258e09d189d291f64ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8960-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "0dcd7494f4926fb04b56e9713f0b62eff3a345b626fa2adaf47636bf0bb4c3eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m15-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "69da86e9cf24c49496529f3041604a6bb1c0c0ab86c192239d31d3a9b92467cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-3782-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "602a23f43b11817ad5439579969753866a54b836f34dfe19342e5188cf088d85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-15-r4",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "608e410d1c0475dac58b1e8f36b477aa8d9e9f28d30ec89d44b550e36bbbaf47"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-5680-gaming-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1075841f54237735c1135ebf92baeab9c0c3f8b051229f898520f5b0f265353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d4ed519bd5e5ba2f027d00635494d485f19f3080d8baf6d711b190323294e216"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "cb25317443d65ba126174c8b7547c7d2f6c0288f859e2063436eb7b350d9bf62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3472-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "02877ae1ee43c787fa980d6e897e14546ac193100395bbcc6bc26fdf3077e860"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r3",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "003130dabf11c8b5df286d9584b3174faa9529cd6149513d13c7ce85d63d97b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e6819bd24e063807336994f36e1b7cafbbec46c2679a365dde1b54b720a049e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-24-5460-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d54e560849c716d0ded4b25d9aacc746f77174cc6d3eeb3a50424eaf337c92aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-20-3059-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4b4fd4cc68e48cfbacaf1279ff42ce6e9d37aa7706efffb2a0bb84fbda2aabd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-5459-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2c6a0bd7b3a91b9e1b309bde7d405812a42abe40001ce661252d81e7cd009650"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3263-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "13deddbbdccb6e5411317e96bdb045e28c0dcbb7e86ed5f32e5d24b4b54a5657"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3250-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "95446bcddec63d36a9f5554815892c104febb73c676a075d789e4b7c69979fa6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3464-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "3ffd081959db4684563f0044cca9ac16d5467a42d40913f503bad8d171bf1c99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3662-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "5a02b9214bb7ca03030323835a85efd84d369ff02a6baf9193083e2b22e8d0c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "fe9e2b75babda09ba22a3e99494198e125188d9345bda2b961f10e98e6c2b784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-one-23-2330-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "374f19a62abe5b7c195038ebc945528046478ba7fac2b7b429edfaa47122e6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e94ccb36573d53127cfdf1f6d617c31ba8562fbdd4b43e48fe1fd52325315756"
}
]
},
{
"defaultStatus": "unaffected",
"product": "poweredge-c5230",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "52dbddaf0c9803e7f9dd389519b829515abe97dc0fbd9b979230de28880f595d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-alpha",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1d2c02737ba96e93892f38c161b3f35fbca79a4302e439e8405d3434ed88fdb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-5552-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "73e72a45f92daa7ef76dcf82e6d13113cd9acbd2250d78d2e02232535f83fbc5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3646-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "081c82a0748297ca5841b1772330fb6e776c678d425789a66e3072fb73d072d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3455-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2fd0f72190810fa5c4a2a3f57a7bce51dd0baa47584b59b7cba4752a92c66ee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3052-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "c4574a6a5e1e6b4f3b4a3317b51d75c3764395775f900b9ede99dca5e76849f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-3252-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "9cc04e65928cf4852d0ae16d55808b42542387ae389ebbd3e42f888638909932"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3655-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "31a7af2885146a94a82ce214a26e4dcdcfa36969aa47a7a1eaf3725fa6a2198d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3265-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7c0c8fab8b15d6de59936a3921f85d9e79f710c6c6db6459804b679d82760e26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-5755-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "19967c4eebd851b31936c8cab20f86008c7f065cf93217f6cc82350521cc640f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3656-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "a0e12007dd08b6d9a22fcc6548d0562ea3a966b2030ea9d00c739971e02b6c9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3015-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "05b03dab647098c957cadd2a66ebb1401dc5dae51f267351c0d076c239d5856b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Studio Sys UPD",
"vendor": "Formelife",
"versions": [
{
"status": "affected",
"version": "a451ed9d6359fd109f495c75bab2678285265a72be64b3e5d0d5447a0e167cd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE1 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a9638651a2475403924f124552dc199689a45d2e2e59e3dea2b223667dfb63de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AU47 M1",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "d3715136d50fc486ef59fb4aee1d7f06552fdf98423809939538fe905a1aa0b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX100 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "bfadb1d20541d4c39857e7b295b7ad20ce81d393f014eae27565bc173c1880c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX270 S2",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e44c2088ee54191192cc690787d74d8ddbfe3fc97c58fb2c42cf8a952784c94f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX420 S1 Chassis",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "c27a0e267f18a89c8ba8aadd37786ef8fe18162b60b45fc209bf992b570837af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY RX100 S7p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e71744d4e18cbee18a1fe381a8a83350487baa6cfbf3729d999f85d7b650610a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX120 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "51a9197d05b1aad84546d9469b2c400bd7536eea62b2760a308e5bf84e71d74b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad457250d51a0638880d9cf1df9dd029ab34b36265eda73c5459d8d0460ba3de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ab6af312a78886a13144814ce766a771604755f8dd303381658026304415280"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eef3fd99672410b85e6342c5757723d0d3ccecef9805237955baa20780de8b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f21b8f836105cdb4051d8bb29302dcf86836b640bf048b24f3c76e930b513b32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "62bb737d55f4caa082b7ea2aa6f8a59c8efdaf9d5ac5b158cbfb32a6cead8164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z43",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1b6ff7d60400c7c21a5b28f947475e61abee187627c1ff12cddb25b1ce59ecb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18def9ce5aa6551c1d7e77e9f53e34701f77b89d6b32d41ea050cc94d52941e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b14d2e3fadc16c97684a4ae947798bb3a67372441dd7252568f71fc86e98ae9f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z52",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "062e3100bfbe635c66feed863141f7a6f2bfcf0b887a5b3d7ae31fb610d17cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-Z12 (rev. A02)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac416150a9752dc20107bef240e73c6054af4992348003429bfd97a7373f4f27"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z61",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "340cc5c8f4468eb2d36b684dffbf139b4ac4504b5db3993c3c1b5145858c5131"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6B",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e761b6f3c7d3a1407addf499ff848c493a9d0b0197368cbe858bbc4fa5a4702"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H282-ZC0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b739af751913ea6ff42999069963dcf6a1bdd58a3de800ab721d9bdbd59bf0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ32-AR0 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a4102b19258804214beb838f61699a7623cc654341e6f60ad986dae805935c14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0a3837abd91821c4ad98687d2dc6456b7fcb05c8b672c48f242ffeabfa3e9b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7678e64f7728c059b228ddec74f0918f0544d5193f7b8efe0bf03e8f36c2f5c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "122baff0bf1243b945a7eaa9ca55303469d624d6150d4da136d697878177f1a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d318d27111a3c5a2e3a6451103750d70dec9d6e9d048f7e98fcd60066b98aee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-Z90 (rev. A00/B00/AT0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbd77ee47e4bccbb2b8af2883765641e9d7c404937da2942637fa1b4b6d4d635"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R262-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7f73261e85bdc43932e49254cb8654ed2ce0945379592cecb081d51e5834289"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z97 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "076310804e591d1c2d4ab1d53cff0866c04a4189e03e6964b528b8a94faa7991"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S252-ZC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8927ee41096d71b75bbef2672e22f640a22ae3588f4f44786fff92c70b861885"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-CE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "79700c28616b906f5534cf45d4582878a73f96eff24f1f894bd04b24c00eade8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac5ec67cafd72fd7f497c3759b0dcf359de8b7db6941120c0c69d5f3eea4bcbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bdf9b526d2e9e65f23ded60745006c65678d184a258761666d3864432cc0cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "630321979d80b22e20ca5fc713b2e3e1a8d9ec9ecaa6e2f814193ab8471636aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R243-E30-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ae9c0a6e84b0c2912eda99c2de4e95d45c0c8feb2a097e02832ae03c74796f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G191-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "28068e88e5041161f4485f958f49060d6a865e4beb0b53bafc8f3c5e5e3923b9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G241-G40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "912834981a1de06dcdd4f8cfd11e7db46ac691e5ef20616d76d859e889c303be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-2G0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dbbb711ff0879479dc30b9a7116fb94f093e0225b74916f6b79edae90d8fb2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G591-HS0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bce2bb4589e9ba8bc8029514a887f3f3bb4ded3556bb5d77dc1a38bad564b435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-G20 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "819cf98fc21e036b3ae7e6390ae09edcf6fc6c260b22bf6ede0852029ef2495b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-H61 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "190d03dff0cfed20b38ae3270c8bb197b024765963dff6b7730d96bfebcbb24c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7eab23785afd939c2abdf53e001e896c67216a6cc75b646d990fdf92ae226748"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H281-PE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f715f7b4128701de97332885c28547fe89ca4214de5af85623ab90670fdbbff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD61-SC2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98c90d7d56e82fcf28b362fbf659c3dfd3f987de96d997defe2ef2e78f33cecf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82bbbdeed52e95c3f19ad09cc8fff5ea17f9f5341fbef5f88fba478c24e9fd66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6957244c7417f2ea28889e02d23b63091b6049b82263872ec3a952765becf9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU71-SU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "67c4f4ad83e151ebe6e61092bec3153ec269e7be1945dbba0c61091a345a885e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-340 (rev. 100/200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1bea20b7f9327d743487da2db53e5fb89ace6d22f56600b58918737418e716ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aef16fc11c0f6ddca64581dc5b42b9d6e4ab66807ae7c5a30ccfd8f6774a2b18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5077c5d90bce52e6e22371dd64910f30aad69c42aaf9a144165682fffe23c3e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-G20 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2b46f65550950fb75d45f5bff54bbed8d4877d803a9688739abd47909fc5f6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x/3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a1f593c61f035734a87dddbe547a18a52d641785c40cfd320b0a0802be57a1e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-C00",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddce5a86b35fcf3fe494169bd1834b1f40f24b1a4938e5239bba011dfb981949"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-C10 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a09c15eaf24a7804b16fa6fc8e4d16c8ebbc850d070439b2c1ead835f4626dc0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z23",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b879d3be098143f10fd76db48424f3c3470ffffbe2f828ec7462bd8ec73dcf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z42 (rev. IAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b98e94dc0b78131fe59ca6a9c0a142037d412e2ce5fcdb9d0d6d10f102b1d5fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G363-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2bdfb3a454065b92210cf8a11ef836b45b1db8679d31b45e65a71d1f5efdee8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB4 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "930761233953091f36c6f92e069229f7dd6c86555c03315e1cf51f9fd349ac79"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c564d83ca92af69a296c473cf748d2a6062883164794856c8be429a652e421fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD2 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "74e19d515a7d2d4644f026bd8ea3ee5035b1d325189d9ff2184892a62a7cddc2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZX1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "637be0a8baa2b2a07788add89178c5ff71b837b0d7313d31252293e87a8c3734"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-Z10 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d2868fe9d5c6ff7e0397d929f170cc6ff006c5d1b5f7bd99d937de8f93dbcd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H233-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bcc229773a51f96a3904ab181bc621231f881b88a9f59b9427555d9bc868045"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H253-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4978fa8b487795206594ef340a6c846814e02e248aaf6d6d22e21e58c194fc00"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H273-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7d216a628dc15d65ad64ee6535a8c190260c9616945108237dab43b3fb1ed549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c185f2a4900213d87796a8f1b7ba719d3506961c3587cc6b6c39ebae2067e93"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-CP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "13b00bbbbe69eb17f726a086841770b17b9b5b02c903d165e5dcbc371b87e4d6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "140cae90bff7b80c41f0fc69c6439ec9ef3e7b54e408a29dcb9b41bcdf07bb3d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36d2df2564747908c8f8b28df00ea5504783b9308fc76899d0a5ac1b57f43361"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z35 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e276e4fdfd0ddecdf0c1df49718595d0c4bcb28850897215b88fa01c239b62d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bb0e8c4030538d2b820b333ffa1b211a7930953f30bc9ba206eb26adfa45741"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z93 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "44c75c03ddbd8689b7a5df96689d730f002367d428da0982bf089c8f6909a75e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f59fb01703b0e6cd5140683e9eb6d98c452b3acb64ab642004276daf49e1ace"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59c838f97265422664d3508ad13e370351e9f482983d942dd7fbf33bbbf00587"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z97",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "42329f479e5572eadd01b94fa8f3f3ae16b7fb4452ac2111f886855e4f52597b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. IAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b999a0a4b3a7336597e7373e3317dd29b91f5510fdfcc8323988d1edab6c23a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z12 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "920c4d1c705e8b80e94b19f2c690d1fa4f25f0f6954db6209ed5118d7927fc32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-V10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9387dfa08afff4cd1f875331c6eb24ac6758d608976603c7398c039dde35890"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "76f7ae620a91ff5e8590a2f22f59018e613aeb12b626b886d6ce2f5e4276fce9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "57be6485a091b1f60afa9a2af34cff051e293d03696c04ba578f97ac38a34d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60 (rev. AAW1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2221d582286ebe04101fc5bd7e353e3f8826c86f948defeb8ac265b8c7ceb8d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E162-220",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0c8eb9d218ca1706bd15989efc2915e792918b52cdcac38a4845913631f6cccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebf41cbd3da1701755a788922944f1ec7e13aa8396a03611cef2e3940da4cc20"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5caad5c1ff5d9518017d64a2dc8cb2a83e294520ba6460c0a1b14212688f39a4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ID0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2902ae30064150ea9236e92b819a2cf96c47ad73f0439233471b89bb04cc13a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-3C0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "436d56f15a1373c341638cc0edd950866bd519e0cb1e0de07ab7df2c59fba5d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83eeeab2bc322fa12b1ab2be69ba64ade98d999f8e1118ba1d6957c45b52a6c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC1 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "083289beeb6b2d85285084059994d0ae833833cc7284428b6eea303099d99090"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db38dafec56ac3bb8948390f699fddf5a3f3f2b33d0a696d41c803c059a5b940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB0 (rev. 1.x/2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eff883c442f1805faa24a44e645413d9c9d3d95e6e0bb5c227124f7eac8187b6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43eacbb8f8ffe499f4d0715cf6f798cd81351474abce0e410ecfeed7071740e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ede862fa7c647cdd18ab5b2cc90aeec53c35e7f2a9e8d3cc9bd4f1f4e7837b30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ffc9128e64f5a30a78f594923301a6110a8a97c236665f4d4ca7ea28d8a8d21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU72-SU0 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "776719490d81637a1604081fa3e9ea7fc975020cbb45103bbe4efc70ed69c6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c0481e584911e1758040140b89593d1839956ef379a6d45d5ac37d0666b866"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU1 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "80073632c479a5522a64e14cd9bdb4cb12c3b86eb8eee5c36f63c40c96865334"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-34A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da898f000b47ebe799f88868276a9f9a0744ae283480c70b4506f17218696a52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NA0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b851b25b7dfd2d50e710016c21c06a5aab78fcd64597ca631669b7e6344db6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75adec4e87cb200578f3899c3bd7435bbdadcc4941e5edcb5a3fe3055a8ad190"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee788077e078691ba0f587f2f9f044667b3463f794d8f38fa0c96e8b68550703"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB1 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "64c336027bad7ec398c64d31ec444c47ec0d0b60eaf89202547967cc1b21fed3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4270e08e2fca65beb36f8adaf338c4b94d248a98eb3d205d0fcf6a1cd2d6ca6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "29ed1fb8fd445c86fb30ef02e78db0b5be5213ece5edebf5f9702daaa94f5ed2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5be6bd89d0e644714c6c98502efcb6e5b90fbdf3101f82cd821d04d2fb11e60f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z34 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00089e4dbac3fcc36ba347ac7d7f9067722601a9a55c2360bf9cae439a52c010"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ea3e4c728b066bf6827adb0497ec6e32ab66c546c4ca89fca8f3113c3d74e950"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.0/1.1/1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5e55411efbcff6e593a2de57f46b6040324f35c1ed14f902333a71b6cea38930"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E251-U70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6c404dfcb9550bf9080bb679ccfba607c96b149772c345ddeab0f881fdd16f8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "84c011953dcd5981156d4d5488c82f53ee73cc839d3359004d491b0f1fbf2808"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB0 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c4dca3104af399295b160bd3ad7d01d38f9dc86e7143dceae68403480d7c19cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47da1b96a4296aa07edf9e4f54df7dc663e8c8134477ee8718319667073a5d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0f77013fe1a7795b311828614ab371df89c88dd7ddd165d17130422289838731"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5b7f646ddc82ab730c91e13b52d86d9fa3c28d0b0cd1569fcf0a9b77509d7c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-X00 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "876f82d1e8632fff9b24a04be60fb1486a1e4eefb8b20183580874680fc06150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8567d8f2fd8a32c33c81aae33ef21e34f818159199f0beed6c10dd6e2283351f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7e9eff716b9e7000c89692637c58014ee0be37d7ddd39a0c2ae4ecba82e38fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC12-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e37407821e4af774debc51d6dd492c11fe6652ebfd25febae7a603a7ef69822"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW34-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "add3e41160a5effcd5a6dbfcda45072059e02f5a6fa39042fdbf36ae8193067f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d5900b5a13292df17073793a00393ea8e60a645104ebf8d95c5407674421c76"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ecbdd2c9fdb6e9bc4f2e48b5b3e1651977a39eddc6480cc4888462636648f38"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC62-G41 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc4153ee0a3333ab789383cef8b0d9760b9f416138a093cd3357370261babf4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX33-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0e138096681313a3923eefa3bd3480e6416c73d627d3888b36ce7bb6b2b989f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9f880e1df8c0a237dd9cf607e19287817eb75f59057e8df89ade763ca7b6812"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z33 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d18f17a61f21b0b96542a3efd2a543cf87b434d86055e48aaac951f09c53e0e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X13 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3e3fbdde80c01e9755408922f67ad04834a61cb5e519ab010b151b68772a9784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B760M D2HX LITE SI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "641b9c056a8fecdc3a572db60e00f0b0fed7722fe9cf377bc4b6ee9208423107"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-7840",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f63845840d8dabf49f4a1137c4b1558257748fc26812bd693de92ed0257362ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z32 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fd571d3ff56fa697a130f06d98ae3d2568e4e3d5848cc0966f4e00617801cf2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e01af875c3100fa3d72d014aaf93417317a1a4a4e69c4a28c216c73dfa5e041f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310MSTX-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "094ba53bd3f96434153ed4c426a2c9f8b62ccab2b7ff60932061f9fa84a9309e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-CM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f5d955a2b3e33b9ba93e98d56a3ce4c997c4234161a4637aa88eda81cfc743a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ad827acb383f51e80cfd4605f8b02186b680f61ba0129e6c054af896dbe6d48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H310N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "de983965452c5d6bdbf7e4137ef30782337efded699beb2db1cb1cfab2a9cdb9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-E30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0ed7595a6c1b6e26d1e930ca3a8c1c0dd619db049ef112fa653b8bf9b026bda"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c70331be155ee7c048b0296e15de195158c1215b1ddb31fb842018467c5857d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S46 (rev. AAM1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4151a030854ddba555d497a9d2626723d662a9c81e86b39e4e2c02c209ebabbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S35 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c33896586db20586273c8378d4fd18e49a4db7b6ac15333eb67536536c40da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-S94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70ed5ca85b768ef6f9bb36baa9596d07fb259c775b457464c138a7494f7340a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-S11 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9ad9beef2a8253dc72e6bdd37d76bd54fcae482fbd3308904d87dfaa4df281e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f446b6d7d932602558e4abdbea9a9b826a12d27c535ca6c2d0bafa5e34ec3864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-S90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cee49e6b444421c55798f7ce7bf7a1eebc6d6f75319c2bcb39bd11b4075c71a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5380cc7bc3d652f0d0316dd3225fb45f1bb054e9c568b9c8e8bf9591306cdbaf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "77b27203150cbb0b885df35e361b1a193163316e3f315be4e7967312b097aedd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0c5fec105a86f8b7ffa77bd983d3ed0b54cbc65542e0ffdb9aae29cfc2ddd8e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X11 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8f28f55ed2fb648c7237e216e5c377da45e9f6d6a746605515002aaf502ae4c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z91 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1fee6620306388e1d23dba7889b858bd56a091cf04ee68db32639e14d9b87a14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "672102a1648ac9839230ff8c818edc737b01fbe92250ae0db8ae2441b257f5d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi3-1220 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39ea2372c5af03dacf3a4112895e5bb59489497c23828e38acd4b4fec35df970"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi5-1240 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d34f17d147062c8aa223fd2e528b8c10c0879e8ee2d6064607f45e93908a935"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi7-1260 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc45a2e1fd0112f5deac4678b7b093d4e233256af8e492104658c38a5ad426da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-S90 (rev. AAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "059d906408ac5c7daa81504d9e9057023d7686c9383faa48ef6f195d4b32d997"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-SB0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "394bf746dc6183441ea4d034769683c92eb999195fe6ab6e1fbf10c4cd1aed32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-S62",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d733c74eeca529ae54b842ea757213532781db14b38c9222f4eb34be5ac7e1b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-SG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35ec23b26774c9030a1deca1b66837805aa7bedd6518d5be506681f2296b5e17"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-S70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9fb2a464f53ad26c1bab90ee2437c0c265ef6d0faf419af58baca323c6156b7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a7ac0837b77d7a91edb4e5fbfde127eafe1601e858a6312af9e555646de46480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "abe7715141d75d5817b2456105d037d116c441796c7a373dbf3307412e111bf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO15-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0766c740aceae7f71543bfb22d3c757640e714e52f32a17a3d42f9d16d39383"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10 (rev. AAA1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2af044c4474abc534ec6da84e1e6415386421dbc897ed2946efe131840de8161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. B00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcff49fc24b1b8cf02fce97a15b0bc8bb19c6979df21136007c677ac3b9023c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2bf55cd3046c8fb548063466ea9eb0802c4401f3c04a13f9ef693fe7c23570ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8448a4dad1df740fb0882eb8533c40a2227e385f9f2f07a546c1d2e6020b7cbf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dc9159572d38d754e168d1290219dc558cc72e67e8fa72727ddd43a5ad187e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83d24271a7b1b9bba7070c128edcc8b4d6a5e7c96caa920baf5c014efbf6775d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z93 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "255ffd2b1161bb8a53626ad3920c40eb5f0f63cb1d5710969abf31797f8771de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "85f9cdc44ed670c411f0892b769e91567f9a81bcdeb92861fcf6e2ffc7773f9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92c197c09f8aaa2e20427f649cacd1484ef7a345040f54eeb3135745b6f671dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efc056c3caa782e178b7ade2333316ef39a0a6e17157c68a61927b3a045061e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ac696517ae7da9f3efe81af66b89b5f7b24beb6e09aca06e61e454915070a3b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.0/4.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ad038a3b127e95df1fc8fa61bafb96a113fe0093d9ecee66db9ece973c5a257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "225cea866d8c5843d32d6edc97764b69b05707e47c9537e6e6e7f4ac06775816"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12 (rev. 200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7969888310f2eceb73544fd8108eda95c1a3ea62ff57da93c643bc55b898f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d31512a9a475071b6e14a03aed7c5286aa0c622925d7a840bdee7158a7d9583c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H242-Z10 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1096dfa8e4e5f5d2410eacac73c51bd1b946bc4d2f110a44e8c33f53d0182eb5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R152-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5297e4a26fd8ed927abcb2438a5ac2a4e35e770d06d272ed77b3d847bebb11fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e81cd2760e4d5090b1d0da86309ba993256d88a4abb8065ce83266bcf4f0ca34"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40d4956a427564b83b0c1a86f1c32510feeeb5282eccfb211bd29f0a0a7767c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58a47d7e153b03ce005686aac24bfe31f405a7cc4670b826ccc775a839de7ee1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43dd7e97fc6fd1fc0ac1ef601c00eed9ec9b5d5325243fb8c6f0ae3517fce89b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b7eee5f852ce1424dfd476d8713650e528fa359f19e551b7adb9b6a12ad467e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-H80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e79fefca976e762f76a8ce36494928dc2ba039de02b69659a87b5245cb27ac2f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d04141fdfff53843c10ef247e885ad9fb62ffc58c89580718ecd2b102a590f30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca65772cdd5fef0d287957d5a6e308fa1126b9b40a2cd701e1190e852ce0bfd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-340 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ade7666d9e200c0929260025880128674b63349911f1d03857a42cf753f10b80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6917b15d532856e0c0f7cbfc3501f4d5c273616046d94695e01ce07303f6011f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G481-H80 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "53a8edb12be4b79c231d3f950e20343f20f3727a6544504259639fa6506f2457"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-H60 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56289ef76755acc7f4e843b3ee0f29ec8f063f113f640b157d095d18a866d874"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-2A0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01c95a23c9bfeff78ab2b6d77ca33e6a967cf624d1afb5fad393776c79a25920"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S251-3O0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "303797b38020f7b91381f887954f819112509c4b855ebd75c7a31dd227acf1cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S451-3R0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9a2e7d55dcf6e3f7537515d2c6cb0e36770a5fbea7a01dafe4a90359ade90eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "WRX80-SU8-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "249510667c5c37bd25d731655d7dbf18c5fc2d8d377c0c2326810cda6d9c0f46"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R292-4S0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1dcce1bfce8c75c3fdf8a307ba7f6d0231504095e1c4e6bf2166a4cf75df29cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcb8c9ec0cdddcf94852ac34e952a349af1ca970d825dc239075286875a9257d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNE3HG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed3834eedb770cbb44be9357c5b05d9800ec9577ba3eb6faa3c47460d78814ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-R12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523e9d1bf5710144e36f9535141955dcf9a3d075fff092f6b4d1e12ee2eda562"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-2807",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "16f990d85b5a42e9b762a08f69614b0c6e3f5c1236364ca38efe92a5dd729bb4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB12-CE0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcf637c0c5be2018d76681b66661d1e6f061c2e1366124f4ef8754c074f8a95c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z30 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92780ca87316f207f58c61f65bc8f702fbb2881688d9819dbe8ebbbbed6e1f67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO23-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "955038954a0d1463be658fe518b6006f9fde166b67e9007f3befb9cfa62e5da9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a462c1a73072f541b6719e4cdee351d44a7cb3593dabbc6809b5b387d909eee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "424e8b46bd3feec4aae4ec33eae1ca8658526eeb66e121adb244d3c322dd005d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR3-4300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cc12fd686928c97fa7fbfda17250579adc4e7bd11e46e88650de5ebca6ed03c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR5-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea44803e9b188161126374021e9d845136edd676d33fc80e5f9348b8d577a87"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W771-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d07d7094aa0dbdb896f8d3dceb093ea8c1d72ee0009472ece73190d2071aee6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB51-PS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "372c9a6f86f60d7cef6ae2d2ee7ca0d55df998ba0a47468668c6758b3d3db725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca8a556421eb318b0e5901085e97c448f1646a1636e34ec6e4d76f4a3d61f601"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD2 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c8ab653dc8a40406c0a8a4d71b56059a2f9b7c7ab9e883290acd071941c7bc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW22-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d369b68d0c38afedcbb0eeb82f2d06d486e9c0ce212ebe3b0d9f8dfcdbbbf5b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-4L0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78ce8406e3b09a3450d41ba11c1dae91456f25c796441dabb52c7b7e261b3a69"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW32-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0cd64d233ea4db6db2a90962d2888f4e5b967fbb24fa944ccbbfc2c02d5a358a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40234a98894a9855db1a921ffe9d272caa1e5702dcdd14afc82f6a91753fd460"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5300",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a3ab1a934f5806b5472f13257771924e3fcbaed289b2d6a860ec2fbbfd2d0c11"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5400",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "06879fa2383284b0222247992f7d359bf5d0ddcebfdcd5b42a20ee5f46a8473f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "68f88269c87ecb16f9b7d9269005ce505a3498b9e3440054742481a2254d5aea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5600",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d98134626baccb58d0d97613efeae6d504b112a4f8d8849e2599ceecf55f7fad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec439231fb2d3491a63b173bda078a128bf02b19262b3549f3a799992442d9e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7704838038c24fa47fadd54f19c5911fa39823ecfb5f451db59271112a07e777"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-4500C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43cce322b194b9be7bedb247098e8b691878f238b14199cfba11af4422b3464d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-5105",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c412ba0cc85278e93f349b9fae6011982f23f8f3a7b6539a36d90b551ae1006f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMPD-6005",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f14b4087af44921d294462fb0d65259f18af0cc23b7ab1c5b87773b9c3c13e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-10110 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6626703c5940d244a87f2967f0c54f4a5a7b53597dd92a0b561f28a2f9a9161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10510 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af98c4cea319d387751cb356a28390fa630a1b2f66920a3202b37e0acb861ade"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbe505cc1f3a4135628b7e22c7fddb99bf3ee1d46f82a84219e8cb0905c20ff2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d27437e85db58b607bc173e844b31dbfb8b949ea3c225e13377ae942572c4611"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bd110e7a5a1e1cdd77af3702309d98f748cdec6d25a5e76c04f63417e2e6a8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z50 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b2bd8851706081fb9e310e5f4a7a97c3a0bb32eb7167a609e602ba6cec1ea89"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D3P (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19c85b8fbc25322544c775c9fdcee793a563d51b32ede6b29c02248e0813f42b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1505 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f18902d7afbe8d900b6552c2d7a86760f05c4698c1018053b2fad97f6ab51f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-1115G4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6c034629c0d8df05227f4e7d85d02d8fa52d7fda0940fd4f80f62a23be06c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-1135G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "baddfacc85e4aa97915493c4f66cde6002104bfc10ecfa3839c4fc6e32597953"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-1165G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b191f4293202c488ba673c288bb5edbaf506a9835a508ec38fa705797738c918"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5013d7b2208a6c2d1ea75bbef06711be676430321f4b275140049d6fd53f8df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60d70e509fc3f7c1da701e5195218f20e297c11d2dd4f0327ea4d25732c120d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0ae28d4aca350a31f66402f4b0f46e05e4aaf77adfc813179a7df20c8f4b148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W331-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f7c60d69e3c374da221c2ab2d2393794965f2e0e1cf296f5a64d4d77299089e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5534cc441ef64739b9609ed3160f296cefda8faaae992448baedb01e9310be7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82f181dfcdb973537274d8fbf4ad83d60ba8b7315bf99def64780a8c29c6a843"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3 Pro",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "810a53fa70ab5b27f2dbe92948b79638dc87fe6015f94c41501562a47805e28f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee03798b5db2710360c33566b2e61b46bc664ff8a25b257bbfb620c332d70f2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ca7152161d4d3a65a2d4fa707a3784811bbb7507332f1c82662456f5f76b5a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 9 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14d6cfb20110768c3da503050dd9222a2514aecd0ca49f2c08e64bf6595b0cd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS MASTER",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "326280954738ecffd23930791fec6dc0ba2b9774c85886b98d33723974c3427d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "91933d348054953096135089baa7b6ca61dc43e9fc25dff45c9fb4dbf9e8d606"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "22869435dede4b52f75a6b82266b67f8930857829185f97bd322c3a72a8899e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 DESIGNARE EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0a1aa3edaeb6b389a08cded1ce036ea9178527389ca1549442a35f8b1b2bcdf6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3716034ddd789a3e8e1c688a477e4735f228bc3acfa18b63e719d7cd1e8fedfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fbe2e27bf4b4543e39c88a4702f487b15d02a47b04e006759cfb6432d82fa0b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299-WU8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d15d9bd6d7980d27bb56848643aecef336c8ff0a695e155071b7dafb1f75d08c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "826f711b5accbc542c3e33d607f1dd10edfb3486772975f204aa2de43bdb52fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0c4215e8207d397914a56edf50428f01ad3676c23630ef7b8c06cf36e45a7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcbed542b232be01a0ed2d52dcd3dddc101fafed3da9f3e3aa6b17b652e640f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G182-C20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e133210fdecf2d57cde25b0bc706437210318e37655eb22a97000bf27a02c177"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03e23d40902c4e68730e74ddadcc716f46032774001e1b6bc606c5294d4bacf8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "390cd14f2be9ff14cdcc90a9e705cc017bb2535e66b93859eddc233425998937"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G221-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e8b934cc0bd3127262a9e52fac754d64abe27c09902a78acec81c0daf883f77"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8d49dfb69b420390cf13ff8f3a3b3ab88e5dcd46a182c4ac5be9868bc6278c35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3b797002d243cbed1182569ffc6b5e5f6243e59ee27bbabae7362fa80be6e91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "24be564cb337350bd9cbf409cd95f29b760e1ff872f99b27379c40b533e9f2e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "99f913a3f88561d7163bb1ed79380dd346897e577315eef71695aeb861e82579"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-Z70 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e42a49d2674808c57b781e8b3d78613a143ba9797d1a856ccd2a62302a49520e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10710 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14c74b9b80e71d3302c13aea0dfea3560e1452a55c698c20e457c5b495154443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-10210(E)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56430f2f4f9aef4e50f503dc8397fdb20b005bf38a8b9029c43e3eed56c39229"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bacd1c945c9ff1ecea3e29039ad8b742c6d040e5792bb45008c1b7f664fb36bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z46",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "31aa7ba19f6edb9472a3da22793803c265a0cb0b7cd7979db56251c37edcfe5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z90 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8cc6129ba23848fbd65b91a9b70999aad19d3b7a6d168066cbe4a0b759fc5a5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z96 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "605db3a5cf91d915929488803446e5a51dda16d661e76840b707474d2df79069"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9b0c2aaaef88b38db18e4efd44b2582c8401f9a17f2c54d0e1f07d2c94a9a5f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fb07e319cf6d523a488d879e7eeef3321e90fbee049efb642b34ad2a32611b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25555956322c0eaecf58fd759ed9b0b7857f9dd149b02de55e2f5eedb291117b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W281-G40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f7c504d3d3907aa4c7f70ca1fbe1fed7e73426eb987b9c5e2f6b31d42e801af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW51-HP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1190d15905ff8656d2d0601c388df633b1646fd585de4fe871fdf93fc23d35a0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z53",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f61e3f93c7f6615cfdc26efce6a83b3188d697e2243643d08d10dfa9de8afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0fe0c762e396660fb30aeddcf5a5928af864eb44399271ed975913f36e46190e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4570R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3353c109a69e6fdd86adbec899e2669cce724bc35db33a86fb0bf1c81a508c2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621 AORUS XTREME (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7edc3eecb5d5ed515e06f8130d875fcae07cb0c7bfaa2e4cd8d86862e5ecc256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MJ11-EC0 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3631995d059e336863527f1511894bdfc61361bc0691a430b3896fb94746aded"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E6010N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9c8f182cf3b058d12bddb039d8a3f3686d1c325c9b2719ec5fc8644e066274a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2da499751e8a5446ac8445cee5b95f6bf75ded5c8ec6738eb67f5c4ac2081c32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6d6107f0d094fab41eaf6073089de8a0b24bb7a66c5851f534a8f1d26812c3d2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "edd3eccfbbc2ef2ac40e723697f67a346fca062ddd6679c5ff8cfbb91d3b6afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "575fc48c70ea9ee40f8016ea2328ebe790e7e556333a95b9b511be466047f668"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-T60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b636c9fc0ec84737f2238365e71c23e9227695cd5ad52bf40dbe8290920fb60"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7HT-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e9bc71596a97741893377b2c52a13b5b2ff0a7b6f985af40725e0755d2c537c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SD8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6ad23c1fab3f0a2babb23e7907385e25a06801c2edd50d108e5b08f923855a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SU8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9017e90f6c47a9d9560cfd92206c4b2e624cd91cd7f0680fb75dd972ef9582d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1605 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d72f64d5a25b9088f7fff456d3783c2fb0e7926cd4de6469c6c3f57690830907"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming G1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0455dd8b57341d5667d4c4dd71767321c3f72770f84db4e46f93d31e50b376a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0215ce75b3629651d0c64b0b241095b58f0af921cec3022c524d531c22f1385e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f528dbe55aba35bd4e5d55fe853afed41c54d78719765944a5ea74dbc062f4b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc7b733f36b027823b3f501864d74397d308f8bc169149cca5307855234a4527"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D3V (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19b4ba1388707838d0de17b6f2e9ce01f70f728926ab7e2dcc0566f6dbce8e90"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G211-H4G",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9546a8c62b6d285172acc0ca17340040cd18ff76bfe5b9e7672824e948f7331f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW21-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60370916ce5edea7899125ad1b470d59cc04b0aeccea1ae5474f78ccf187e4ae"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW31-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a89940e207a6fdd61170536d0d8fe66b4584c38a804c0df15d23c0cf30d49e35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-340",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d2565f697c692df559b665d0b97b3743c9de07c0ffa83b0fbb5b86aa821e8622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-X30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ca3df4ff24732338397d64dc81509ea5a7c4b979ca3f2ee6c7446d690355c52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W131-X30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fb3aff9b87102cb3535bd80904b7252c40ba4f556d9f355a45fc9003cb29e9d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z42 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "09d1d8dff99b19615f14413d6ba20891819d481b12667452786510209344095e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G180-G00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e32576a5522533c1914ea8aed13f238022bf60eb6fb86ec5393bc8ee56cf5a06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cbb6d5a01124074eda2161e53a5128e0d0d8eedaffa55b14c1dfdd6fbc5a067d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bef72cba124fcef35a3ccd67b94707f20c2bfe2a4f4d89f3497affd72b8c2a73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G50 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9424cd10408253ab228dc2125524340f5ca53759e3ad4e996e7cf0320f41884f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G51 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c17b5d0b9140f95f5317619866739be362765e6165292cb183f539b6758f34b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H230-R4C (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59a3fe40e2896be666fd2712f7e5176ab10ca9335b39bd04fa48867ee607c066"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4fc77114a472bf1902a66a35f51a11689446c8d0dc18000717a5f74ae6b3a2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-R4O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5cda726ef82b73f9c764e39a64ceab32e4d6e238c3019e06d3b7f2218d68ea8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-F4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "934742dd01634ef45d78c2a7f9f3e89a0db2cbc7baf994570cd8b64fa4491da0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-H70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "499d17336ee9e6be59a733507c25f7b343933bd728f296f6ef08af611d0a8ae2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD30-RS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b9ef069c1c67a9caa29f8eaa915605cd0bbf1edb735d92abf2c4e959ca4a726"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "473033483d404754621122afe34dc8f8f47432bde116cfdde03ac38fdf2fb054"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7213c438e3f07e82dff82a5b6cdeb5f80e8b82ce6e12fc377732a8df2c527bfc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB1 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7540b3951f0ddc6c1c1f4eaf062525f55a1c6e862022e4a545530895510d772a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0db641b3a89e75061d6af75e41e365cab69a819f6880d4bd0a0f4ea7960fa17e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "15f2bdadf43e6d3731df0693552d4aa4780ed958dcbe0ea4ef80bc27510cdc85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "298d5755fa084d9268d09063222030993755cee31f9fe5429323b830c8c3f5cb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU70-SU0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b5caac23e6866a9bbfd7962a5557ddc9b0369cdce09b664910b35bd66e690cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW50-SV0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cde8f07d2e7d14233748df612e113ce348140090694b96c407053fe4e6e1690b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW70-3S0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c314404f2801dc3b04cce95fa27a97f58459f9d70c8e3b03bbfd45bbaf5e40"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R180-F28 (rev. 152)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5d3bf4c8452e70a4ee31e25cfd555694af3cf64eda965fade0b21e8a262a2c10"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R260-R3C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e6bc9c983e21a0cfcb2d86a9dc88c28e5ba33387acdff81bccd6caf780e4619c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-R3C (rev. 143)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b6d0ebe479ce082420f5412fc099860ab825450e58d96a6b33c5013ea061864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R280-G2O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efaf5f327a471776f0a75a2b8b7f963c8ab72190be7f606d51a0c04715dafe70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D120-C20 (rev. 230)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cef953fd8883203ef326a6b195a90328ae31ddc10736afa171b617a906fab77e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G150-B10 (rev. 111)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe702d3ce5fdade4ab194ec43fcf6f0a070123ab547ae49b9cbaec33c474dfb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z51 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4dcab1a378bb4cc541f210917c563b95dd678e185b4d0dc8483b175cbf9097ad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB10-DS0 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3aa61cde7b1886fab7e60e077bdb39d0a94e3c451593d13e87306b88b4e56a80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZAPLAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cd755796109542b3da08826c56951102e5034c76428138d1a6dd4f1ca29955a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b22a7a1693d8cb2deb608f8e3ab366f5eea0e6bdef6ddb03a86d599fb2efdd48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350C (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a42535bbb37725951ac18b0fa9b5771454ce707bcdbeacb8120d0aa0eee0cf1b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03662e2e512cfe18afe431d968d60e944af5f7514f840754864ee4cd97990130"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47b54ae65d44b227a3bab252fcd465df6e6d4875cf2511f1261f1c8e5b196e1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EACE-3450",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "421dfe54ac2554e627762ea96f454f95f7232f3f238dc9f5d5fc96bbf284fbac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EAPD-4200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6009503816a44e0d4fa7d0d74ac7418b6551e31e58bab97390711055449e52d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb4e9aa8b2416ed2fb7593a3c93d5fed07d24d1f349761a1790deb97778a565c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "93d6ae2ede6573f018ca1dccc5b686a0461a0d662a353511a0b420a10935267d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W42G-P08R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0d6176199b56171ec12bd663025c664b2bf3f8b844bc90edc8dbc3cc062871d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MA10-ST0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00f354e79abadfb8b4aea11bb07c3ddc16f00b3055ec8c221ad4d69538bdeffd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11HI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2fdb64f2007196150cda167f3eb121cedba80d75d0b79def30c4d7155ea0b2a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi7-1070-NK (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d274a7eb05cebe468e07b2e6692a11c90f222d18077b3d058fc02b464046265"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S12-P04R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25b628eb776a57d9fa45cffb00f8f3347cb9d7c2f3c33712348b85c3ecad2d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R272-Z30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fbf652a641fc3d847c148abb65130f7eece7a51a9c6607f1c403a8bbdde6ce48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-1050Ti (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0c57eb7255f99412b62429f165eeb1f8a297c26a13eb6d7ddbee91e32dbce6c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi5K (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f37453e390737ec297686b784da5aad11acbaf8375d377fac533caee996c1d66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R160-S34",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "898a0ddce89b59e6993ea651b0a0d4b54752957b63274dda75160674fa0928f6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-T90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c02c66a7d393e7bd8cf757197bbc6bc22fd9f9b38a8a1068166eba97bc5b4a29"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11BM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "410a0aebc3826f029ee6a4cd0c5816eb0676fe99a0b112e8ce55e8b2f3b49e6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11JI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05cb527ef122bbe9ebe54d4678686e6a21b961f16392841f5f0b0bc3882a184e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11KI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "945d5b0e567bf5604ea9b12fc7f3f3bb12ccfb1935b9de78c9bc77241632fc9b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11TI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7796142d4d8a09c6f416d5b3cd452caa659cfca40992683d7f8af55cf4e6a7c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFH27AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4d3a05e1006e9d5a1045ea65277cc4fba148ab4533ccb1b6d52ffe54edc7fffc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4105N H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d1879acf606abac026703a7fe242feb538192ec6f01642ca33ba6d6de55a725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc5aa15ece1e486f4b7d31c5ba6d45382204c115e556a6412d751e25703a4a7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-8250",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3584936b2dad0ff3ee3d6b167442d39dce8400e1016267462827ff20d15dcdf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-SBC4100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "873e676d25545b3d6e133a2c85cedd5a4627a11f67513e54e6a99e812e7618cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-8550 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "591b486bba979b64d20fc90bd63a5991b7df16b5aab1447de888e3d6090f1086"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5A-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e13105b80056966dee303194e6eb7e2f622dccb80f5fc5780100197d43b871ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7A-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "002c5c88a393a9da6b48c30d64bd702f6b50fef07c32f45b7c09f40fe2f3f2c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG6-1060",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "289cffe9f81f1e9a9cd087bc529701a9343084e499684caf4d34bfe8db15f3f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-1050Ti",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d8b09f7fdf906dff7d92049fa20921927f3cfebf564455eac78ce2518ad03a1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG6-1060 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3835eeda7653120a02ce98ea98ba75ebce53ac1efabe3b81d0b6dcc9e611d1ac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi3A-7100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5697a205b0e85c8f31e3538135e32b72ca60d1652162c30007d94ad079096fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3A-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f7481194b1e0a153551fbc9e68fef59f463882e3fc0238673ed6293715366c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3M-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1cc2040975c62eabeae3df92e63b2c1a22c690a97edcea1576f83e975355db4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47a969af17efdfe04690233319d36d12ff820901d0817ce17846281e7d5f49ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT2-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0aa384720b8e5c0d09b9b0b14cf14a105e4b607681f778bcaa202412e666bdf1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f61c63e919c797c1faae135458e0db89f288a1d05402380823562f34452806be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT2-7500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb0603d8ecac9baf7de500500990ad0a7e9068dfee69f296d62de549f69f9b1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-8130",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a74d2353acccf98743271fd296b2bf6f1e047cca1fcaccc2fd9095a7f72fba2d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iTXL-Q170A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa7e7ca9fd48d608094d5f56ad6f0166db7be91862666abbb6fa631055b98f5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6600 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6504f61ce57f6caae37cc7c56910267d18a1db46e6681178b6807f0e26ab966c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5HT-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e649eb460cc049ddac440fe93528336fa42bdd9cd7a284ad9a2481647b57e75a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b772a8c72de61e4821a04793a16c8dc8ff7b354fa2a0bff189d879df254c9f1e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7QG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f4426a3de06ca8015af5798b631afe601a78a069be9e70fc818222d9b4f679cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2H (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee21f7397347f3b42d5229b41f9d9a6b4be739419f6f2bef1c3eec8f5d3a17e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "66ff6219a24fb3662b7b3d4fb1fb7937649dcf052cea4364d4c9b178735807f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7H-6500-LA-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e23a81c581d5e6c351c2cac1a944ef5759271739f6150c3ef6857bfe401ae62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB4100TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5abc359c698cd90030a597105c4ef899e4ef56271b9e0f43c843408b9fb53d33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cf2df7d9f1ff5f087021f7b47cef6aa3efb47cbfd639f730512bc630e0c91f81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210688036c5ecadc5d764691d511e738ff32146bc69f26601fd45321c65b0c7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCE-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "327e84e3cfce4cb086435232d033a20ebcd4b95cd5aa4b85cb92206f44507170"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCEA-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e166fd67041801b0481c69bc271ae73e0657f1078442b5740b09f6774128e01"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6662b3f0d921aaee11ecae2893271fe861524620b05540e255d1e364aa65abb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030031c6c1b9422a56ed44f04efa2ec84fc8a2de254f24d14989934f613d12b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSI3H-6100-ZA-IWUS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6399b690346ae7ceda0f8dafbca5acd17ac4d796619568a51cc8e50f5b630b42"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3A-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7049738618fc298adb3099074b3419bcf553f0e54acd9ada2d611fe64925026"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "044e3800c05a232d4a8821edc28aae7927474c8814a385f717010ef9b12a5622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d86ef77e6d28671ef838b314840a4ff9237798c058244805b3b3bc01010db097"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ca806b8be055f9b5df84871c469279930b34b89de515068b1cb30bfa9c3cae0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5H-6200-B2-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40f56a09ded19979902613399e9d6c84cee02b72b7114cabac53629fe2c068be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cb60622a0063c6d261c5693fd423d7fa44d826e8250812f50c7b9a28921712c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c754aa67ba523b595de11270897af05dc22907a4fce3f4880bb372b1e18d9164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19a209b004631abf16b5f6abdbe22b3e9578e1f5ffc4bb94b6601fb612ae47f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-7PXSL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "663977d4a882f59c8a8791d427ef4431ca63f89ed5683a4cb6d61006f1b1c8d5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4260703c9695e6975438598d85f4046bd34a1f16f77fe797b22cb45b4428f83c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e5ddbae819b82a8237740cccc23cee00844fa79a15e18e6187854b29e7e81a2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 7 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b767595393d045e4adb4225856611b3a51848a17495666be273823220a0dd165"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming G1 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3e85abb0959e87075f3a91e0048163e92c1831edf3c70a4d85f6ebbe5d56cfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Phoenix SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe510a8d06c948ca3e699a51d8f60bc0411df8056124d5e4a993cd526da8a0a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Champion",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a85cfd3acbec43f545c8586b63aa52622d9fd00303bf80ff3890012032699ea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "95eddffa23bfc032d7d65b730d49a4d87bdaa93e349fd9e30dde6a450b9a9bff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD5 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b023bf42423988805835e5b7c48af57c0b487c7308cfaf5a7a0ff75e3ae8cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD7 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f93b61306682c563bb68ecb67dea64f9d5b86a8e1c7cfa7fb2b4ea02a15146e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Ultra Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "90818dd14d621360badea1463f975a367952e2a0d43e7dc73401a7ab0a2d3a1f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b8e6db2e08d8cf93dcd44adf437d6a6fabfa7b309702b35f7ddd4c1790734c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Designare EX",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "71337bea704f642aad176d64c9f64fdcdb9f38f8107294a417c9bce7a104cdd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0307e5ffce3a9981334d7eb19b13caeed61ab8074212943438b4a423b5d2a9b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Force",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "678f05bab483e1cb9cc2cd51415c920bb4307b31ff917dc46cc44c6c2083b5bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "295417e80fba51a322a02a7e4c35ab04af54a48355711066339743e88e3922f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51c5cd38074336d75c166ad86a2df881b53b4fed849b538e3281d1bcf0502094"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "27abdc6ac0e50d6d6ca0e937c0a7ab1efe8d2c53c46532b68f0cb1a5fb955517"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3160",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cd9ea2490848b03659e0e7dd7871ac815c54080e5588a530afe35cfc1ed585e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N-GSM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01b2fa505a7a377587ea64b20e1a1570eb7f6567a9204ec972ae478998236a0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MVBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "86a0a4b3efcbc51e14a0a307a0efe343c7a7e3e2bae3a6e0502869f610034ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "073a6246ab57b038afd9050e2dd017aefdde6dfad5d61b80bb2d5c3c71134b73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "be9c2feced70f810a5d08ec03dd8e7df75f9abd066a2ee30ad82136f355ceaf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "305b23937168ebedc60ac6756010c07e4588c48e9fe4694fb935945dbf4be6ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ab2b4adb933a22cc5b3b3739e315a68c9a9a3dca20b1ae7f27713c0279f6670"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYVA (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f96a77ebf7806cc05507582f25810237aeaea30ef819dbe90ab2227f8a36ce8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bc76dc04271ff2014eaab3560bbe3177cc08eb3337f4f512c7d44b98a40d1d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "713c6e95151ae02f075d0391a12e47fa2aaeed199379377bddc00590ceda1795"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b66a10f650f73f5497b22a2d45d9c0bf4df9a987668c4d617e62925c5c26c388"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "447d66dd22c3af2bbdeea4b2a766cb3fa4442466d0c02d62647de9f3683cd6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a04064b45ec7d0c5b6ae123d779095e23315e6ac1a150d4b3190909a2237603b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b1276f7ad8788d3db650a672e6ce6785d5c3922d2bc5aae554ad1b48b62dec5d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PLUS WS",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ba7690791f1adeaa12e45dc9adca1ee7f08c99bf5f1c51961c6975d1cd14770"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efb150fe9825a88101d934fb5a9801f970f6e734e758344062d37152e8baa1af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f374f38948ddbde29b9673cd70ce05e27af9f3be23a7bc086f37f35a68ede4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec7f01320c848a88e89d3db821f462448f62e5ae65fb4fd02dc3a5602ad1eac0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "577535df524a000747a1e15828af3de0cfe6865b0b20170d024974d6b5b81160"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901396591f3682b308f9cfa279cf1a7f8d4cc6622a9ca799e6b5e1d5bf769f2e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6a24bb276e5c9b05ac4cca0da01e1b381245a0d217efb5190543de6ec41b2505"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-WW",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b565acd86a3f4e294d606bf6c0e42eedc4b7361f4adf7c31ee4a806b54767cfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c544cd0b03384834b08b784ec0339e2b91a129ee56e7f4881101a10af567e6a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8b02d988ee00fe78039974032b856c56e741a4594744b4f6376cbe1df8271226"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBSWAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "41bbe9daa5808a1c5b9836a654d6c6d312ed7034c304f963af28d13eaad84340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-M.2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18216a9c0fedbfa3a8c8cb3380845ff086beaec130296234d58d02d24fe051a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210d858cd9ce7dbb1b76277fd580e1c71214d1f7ceff46788efda64e817fa95e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c80df47ed107f7ea4eca4e15a55fce37f1578b985ed45131b8c67dce9ac2bdad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110MSTX-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "55099b8c517078f75299dc02afe1f09167bcd7760c0f46546cf4f8274b54c465"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5fa2136e6ebb55d5aa3c0bcee64bcf4506a7854ca10fb5a43b8141ff4bf1275"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PLUS WS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0bd8853cb934be142b7edb2ef31a2031fb348a6ecea1db37e466dce25bf7fd6a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a08c05bf56e1c4e4d180d69266bbcb244e7e2f85259d86c05bfcf5593cfa33f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P-IN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98372c6dea313b0660ae2f1b1c80a8a5d7e93ce07010621392faca75818c0fe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af4026ab4defc142e75d57ae35e7ef4492fac8ab6c0cc55c6de47f3e21f5ac24"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2PH (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2977acab6438edeb2af8a4e3d0c353fd89e9b2d47082b528c3c23fbddbdcbe3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464be29c2ee1a3f706063374be13365d0a296776aed73fd0c8506f1cdddb568a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D2P (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f89741fdf7f21d8670407a4b8038e75319d73486009e08a795632e94fa27df82"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5641071fccfc0169979343e131d614caa71a2b334ffa45d1ee10817ccef73d8a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed85051f384bd7694f0a86322c705f819cc18a0ced71d4e3c3946b37d4f3abe7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c0e4341f91bcedf78c301778d52492fa304380cdd15bdda725910cc6709e033"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LISL (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9a8e636b33372a34e9719b8b20d2073bc56f549b64e5af83fe617187a51b97c1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99P-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa52c6150c49a84699bec9739b84f5a2c073f4f69b1bc84028f3b2cb15b2167f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper B7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92311971e888a24238c48086febf47b2d0820856e514dd6308575291b6de4e48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6051ccb31aaab7240147a1fdf9b8f444c7ee4bde73ffb4baca63b02bc77dea81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper Z170 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3df7b53ef2284dd2f3385aaa589f87f2e3fadc93d2755e28781452a273d999ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "878450f31de9dd84201895e81547ada2085ec94608d7fb6bdf84d73dc3b98538"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d1d3adca998106090f4b2f08d6c50769e88e944ed640518d23f8865102c2ec0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4cec11820244f485baa7f61d50e60a514b0c5aedb87d1a26cd6b6fb153fdf9ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fdedaff9a18229027689f23bef37cd8424e248412137bbf710fb6163eac6ac43"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da480d23fe57a6003e41f8c88e2aacbade99186f0b62ba4561663b346e9f96e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fd1eb03f29343e1ba70dce50264a7143129fe60bde396f6e3715330623db8de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f2da89fe72acf6892b139fd4f7a047c30eea75cf5c572da6f901511658ae1522"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3148d78c2efd368e986a43b19e209f2ad4817e8a4ef41bb79c57ec7b9dc09f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "086d80a421ed4cc907120e6c96117c3b69b9edaf2ef6951fde7d3dbe6ea4c878"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e69ba3bdca3335f01b749abb84c702f6f926eab3e4d6ca70dd5ab84c3aee24a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "639cd1a8d45af689d2fe1aea44b62d2110146b314f39be8a5d472e412842e61c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "94a5124370c2d66b38a568b3d8be4a98dd8d2e25313b68506f7753c4d60be97e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "825b4bc9bf807631611cd33434d1455bca3d412b9a03463fdd1092c54d5ebbfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "12886ede3cef3c93c4602ff26519a04c9143e903b103006ca3805c3df2744c8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix-WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "330f761ad2d43d72a4a09776d76bdffdfdd88d4ddf6002e0056e2826828372ab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fddafb4af375516cb2f72c9308852c88738a66d57af9deb08e9a10f1dc983499"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 TPM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ecd2f653fab0c6dc0ed24c68a8f04c454cf8dea68b58d149e9d79758aac2c54"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f71a5cfc0646d85af2847e6816752e81f3b4d2a3ea5fa94516aed9464eaa4024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a402dd098614ebc89fe70642661c52da9ed9ba0b21627cff4868defc97db0274"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e24220caffd6ba7c7e1835f12740073a9e3a826a1ffb9bca210756c224eb99a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7802bf1fde1f8771ff7165acab0474471598a46df398d7db84adf911d2d37260"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b0a77259b2af63a9704b094688237ff3c29fac1c011a373a0f2537a8a543d1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b73d5f184db4524883fae5f01e681f52371964740bd6fa957998ab4d65537732"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebd6b43db01ccccaffc4a08182e03cf6633d5371aa69c82f7300141277fe7d7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "756777ea660defef2629b8802bcbdd29b61020fa8ae8cb07045a7d5f991f3508"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-E",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "879f28f51c3b235744352f0808b6267258131f2594f3ff85a6938401e73eb9da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50f77912004b73bade539e1c3983a7ab78984b8590a64d3e030ade4352c49eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4a209b19361c13d7a18fa41d8a257a22f6c806bd62f04dd24cd77abd7d3134f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e1be66c511bc8367a2b1ab41a3ca60cfe46648bcab2d5f1f5bdf5df14de1c05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Designare (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea3c21e1aadbadfc2e9ac0860d94eb87e6590ab37f98326e00b9615a13a6208"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2cb69c081c6413077fd076d7230ff816931ae65bbead2f94f0b12d33e1861c9e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eacba20ef05b116d70c6344a54486bb7c23a131d7c897f5399b9a084a5bd5205"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "38643b383b7d51cc53298693e108cc293779dc43f254b2e2b17f66a80f9e4175"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3cb86dfc649346ea7ed4c8ff117ca91b59435b9baa9bdd8e6f2bde1dc1b1124"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60a230b0a5722bfbb364b6d64ae3e1b1cccb6161bbd6f8cc034977f4d283b4f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c6801b8a7920939facfa379b6141016651601971156e426db947ca40b6f1708"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-DS3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9ea15324d90a1b750cfcbf964321370a56b116b44a0cbee2035cf11ffcc0ef8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78bff3425a6b42b846508850f03a040c22c43566947ac1d039b431fb80a31451"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03299dee42886b0856629da99bce9cedee322b80bfbb89aa6943913d2da15e03"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523817566d04fde3f7fc0215b4c4758243319affa5c1819e4f041c290a36970f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-Gaming K3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db4668c191b9266a2afbf974c348885a9d10a3e1750d1e100418aaa896a5a103"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bf0aac3f13b0d68c6a255735eaed4000c7e5f09748818746b4a1038f0be34f78"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bceea4f950f07347b40c579223456984c0515a2cc94c4cedbbea3c17e1c459eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "20607b0f670b297b45523730d2204e46603cb3c65f47e6cf8293b07b7b1178ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a34cb81eac53b0800c2c02d2984c0960c0d68a22707869befd4af3996be42e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fc0eb68179f1363c19896c7cc043021a57cd45a3492187829b329474c361722a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170MX-Gaming 5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b87e20d143fef2fc32233444070130834ce5dbbffe06409cb537e59c911f49cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "209045f2bba172fb91679d4319cfe548c24921f1e28dd9f887e3a78bce515e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d67b82421d81df8f3d64966609e3c963be6d0dbd87df531ba5f3ef0bd61e5353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Designare",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c061fffcfd8d7e38afb97fb434afc78d39d22bf9b02884c7c1b04487cbb7dea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b1cb9593c0c1890a7f1e922777c206012f2f1ded7b3339d66fa49efaca44c74"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "438bf66c9433bfe1ba92452f5f7eb1d46cbdf9af9ab3c3d1d4354e902fb0f257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 6",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25917f5dcd5f5a4c2daaa9fc0cdf991b365e226856202b4e5e987d406e6af95b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75468e84df86d3133927f5c08028dfb6dce55168c99ec9fde08397f5ab0865ce"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming GT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d40ec6b83d08a885cb576844e609105e15fdc4e48181dbc861e2bce0b657b59"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-SOC FORCE",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5c25f790a4eb79b4ad3c4ceae05329c0878337257a6e31c276ff7aa5c18accc4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6389e5f47ee85c43b2d9aebef2e0c8a9f06856fabb148496a8acf251cdb3c1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 Ultra (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a01bb5e701b3b847766d027e7b9bed8e7bb05403ca0160734bc73c93fb77b6fc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "260811f239a5a92f4a894f52c5b7218faa75c5765e3db17a4ee33530bbfc1295"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad921f429c443cd2a73ba3373fb6407a81b4b8d53b3fd5cbea07ca847ddc75c9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464643065d45eeb1c2566dcce90bd868313319547c91d46e3cea78126109d374"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170XP-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32d8482434dfaae6405eca2bf724939194c8740da638c9e3e8b760489b2a1128"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-1900",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b0b62e4ea23df186b7bbf0fff342ec107596e1fd249721eea75375982054535"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e03efb41e61ac04cb14a63c5ee5a71d3deeddb29426e38eab1c68946d60e26a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4005N D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bae6e219e1ed8e8164382c4f05db847386c5f2908fb2fa453066aed4531310b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aecee44ca1c8bd43d65abeafcd5f0085e1165d42baa953808d566005189746a9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050M-D3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d4c55cc53de9adaaacd9e70527becc4de1cb0b39a605791601fefcd0156ced4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c717a5d6b61b22bd458dbb497dc5abad9e30fedb668810e558a46f994a656435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "63cd7d4698c89b720c73125900f4cba4b8b1c2b962064280a93dc9ce2a0e9549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c4cf96a2ce5bae121b0594c2b41664510cffcdfc4001072f2275964c20fe12e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4685e5a58d4cf84102460110a5fad72931b1b46eb9f71650811832f80580bc0c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0474259effceedf7aedde543afa096fdcca74d9865eac223b6a91b4ed922310"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f53230a65454b8805179f246ac3c8b36bd274ae0051d900cd04890e7b765555"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ba0474e2bdeb945adf9a819854cde336f3cca848e1ac41e381aaf03d397c7d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PRO ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6ed04464891a4cdc3a25ba34d3cd44599bd118ed953c68c8b63f11be2dc83d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PRO ECC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "764d56cd4e5b88fa97313d5eef173bb426aa27aef5d81794eaf5b9c1fdf38375"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X170-EXTREME ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35f6ab275afa77bb30a5672f32b196d8c76208e48500d7f381e05f8f12e400e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bbb58a67574c989b095f38c9fe031cadd5a709235d6e0bfc9a206f98fd5318f0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-9SISL (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "493437a68a7a7b46b645d46660e17c3b6599eee86cd06f592683e56963cf9a8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-S (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "554e7be483afb47c81760179da5199ebe2f59a97b7146e50ed42f35728df9c5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MX-UD2H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bbd2f88bf68b66e974356e0e49f63b83fdeea8d148da445e24073d8012c0c3a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3P-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b7981e34bc8994973c48a18ac01d6b075f092de47d35fc62fffdc503ecf081ed"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-30 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "485b963baebaf9e0d0d3f0438da8fc3a5e74cac6fc7781e732df5ad0a3be3eec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2PV (rev. 2.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e2baeb611484b3c3460fbabe2b48ad91111e9a0cd7d1f189ab2d0438a69b3dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4770R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "73f5c64009c9b8ce26c13399584a65b73b3b5201475b04dd9621f5433ef959da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R130-134",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "923e61ed9ecf1c37848cbe56822ce753f455fddf25c1eca816f3ac04aa46daa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-D70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d5844b2dc05f8374705493e1d67700d0421f63c27ea10070c60f1871dcf540c6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P15F R5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e112ae0d90739fa839e6e29687412b5669a2f23bbe2b418d96b65ead135ec349"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-20-3060-32G (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e0251d4518373ebab7aa1dc037d732b5c04e92306e16a8e8ca1479df0a9ae88"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MP30-AR1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "586ca26deb275734620c0b80c8d16dd86538bff6116f5d7db1fc10230d775eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b5b834775e9fa3cb50db4d25d9df7849cf0f13011a209fc53c51245aa963856"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "984e1178ed45439578fc0b3cc2787cc8f972987c087fc5b4762ef5f421cf5782"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "240c0e6220a07f27d4debd867f2a1774a50be1b37c3f53a2dab272a71280af4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "10cef05010197e635c330548e99ad98827223f0c8eada8a6e5a95ac7dc2880fa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9387c8f1b5d856bdf0ce43c88413c22f98214768708183bc610381363dd269d8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-3825 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6775386a28b32b93d1853880a8ccf1b916a3bedaf7ba4d34f2a64904de792417"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d11d8f85507e54952adcfbb82d5d58ecfeec7674b756ba62c8e1316d9a1500de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G210-H4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dd75c90a2a81a34fee2c17a6e72b8ec2c93120fbd98c437c4648ac5fd78b6af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSQ77DI (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030615cdc1d2e52fe185f8fa8e6e1c1028beca283a6be9215482a39df1418622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcac97ed60b61b1991fc9f499fb3bf0e8594d49d102e76a988ea8933d099d396"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M9M3XAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3295cec309f0649ecec6952824abfad776ecc1f46199a080932b5e99ac206b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-3205",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a080c1d64fb844389bad75a733e3b4c5483b07623276b114575d5cba32170869"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-5500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14dca67fdba7b20c48d3c16446db2a648c79e5f94712afba6e720ecf04ba5223"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B85TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d817d05c86c92a00f00e286c6c26cc52e6a50019970a71d98aa07c53d9690c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H81TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ebbac1eb55e763bd4efa47f6232ecbcc62d73645c3291e00a3d5cd880898ebb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e555305c3219cca7d7b8d5a667ae2ef454aca7eb84341f07e1fa8288cdb38359"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f237b90cd70e0f63c0414262a0af2fbf8456ea78252750ccc6ef7fe59cb8774"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-5010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc4bcea45075ba867a4aadd97494ddcbbe693b23131bb52703d3c42b41340719"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-5200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39b90d14141556595814f43afeb015cc34e75acc31d23b0c505ba00d1c4a6a7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MATMH81 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dea93336a790f6ce8a80f451d1dc454eaf29b034a38a802140937b3166c4d450"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZJ19AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51ebb3341dae5033164b3b45470115f49f327e5dae5ab111df2a59bc04afad8f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H97TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "882fa77c019e12dc61165308318657941c1b15c1259213e78aa035017fd50445"
}
]
},
{
"defaultStatus": "unaffected",
"product": "U21M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fb97ce4f81eb4d83364b9377cf654a6f0e8d9271bd8e1e9f45f78b07f838172"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXPi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8a4342c4bacccf07bdaf52b9cfadc8789c37092ccc0c414e1848e4d0317d01b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-J1900 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddff03dbd491004d20587de561e976bc8b5b5366723b51d3f59dfd1892b9dc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-TCV2A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70c80b940abbafb0d631870322b5f7c8e306a2063097493ab471f0ba8ddd228b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MQHUDVI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "092c46188af77b69b4c19e349712a23244ec7cdc885c2e0150a8209c1693c95a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-4550U (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3d7862eb46bcec3f0eecb5ec94caa94456def40792a125cb9b7912625be5973"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-2955 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "161c97b5c0ce6cc90a70034d8de30b18d07c43e50d5566c1802dadc967cb05eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05001b41f2adc9d6c008f12f9d1d9669225a2366c9a05f6bd19d420cd5b13fc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6b51ad77bb7963ec455923fa731323ceb72af167a0a40b8c2b91696301bae1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19e2a33d2a28a825fb89e7dfda9609776110876b204c5ff760edf716cc7c390b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "faa729af295c234dfcfc5ac4ab91c8c255c1b054c612b9cbda1fce33f88b4d51"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G3-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "718662066149651d1b7506c7582df2252c555428481b1821829b4db25e2a836e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7G3-760",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7452bdc99e762f3b54571e03c1b6ab0873529b798275149fe0a8bc057929f8c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3448017b88b33e3949d6c18876be32e506d827f65de6c425ebf82f33a2c3f502"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eb08694cb68b19cc7bd0bc323a46e8ce6de5036078a61dc8827ee480269c88eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d7f1a6c78df7317f866866e74e881d91485ef816e492fdf2a6fa02b940629494"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0e7e5b4689bf7e81db1b56185b2a1186d31a50f1cfd1c9863a0746f490ebf3f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSV (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc9b6fc8540a6abe60b8966ae6c4217180cabbb3471d12f93e3c81dc206c8bd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH87FI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c19f30c4c9a444922cb61cf136cd48d9674d2134b98e618f6e7ab9654eb7a7ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac8e4d6a033b6a2d130404eb06e193b248a76308d4a82eeb5736d4f251af6826"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH61DI (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ccb5cecbe797ba2e130f297ec86bfbdc629ebaf919065e50d3f8911cc05b3a1d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-XM12-3227 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c67607819bad2d7abfd1d47eebad947f9920352c33b96db61f9f25c05bddc7c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5502f7f96b9ca121d3b52a1a804c877839e76e3dbb45beda100bea672067d26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A85XM-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "104c3173aff7cbf07c72956516cdc7c34e6169604293aec90e86bcc4384a799a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4c6ce9d730179b7a5cab37a8744a2ca588c9a2a8b8462b62d2c96757adaee61"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ca64768668cac95b2c49594df5412492fd3e84a5ec279f5e5782d9d08d641e8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d28128151819a06848aeb241f3dc4737d3a9b3918b739f8c512085af375b368"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32b1eee6b2e1553ceb902d17d0ecf5534034685dc8c2863f9ec99d2dc587bb72"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "26778248ce3156bc2d3e70461f079d1292435aeca9ea2c6ef0e536c979845164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b51371864d4322ca5c584cded0f6bbad11dd01cf498b841b270ede1f03497137"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c27a0ca23c6d3ee9eea18c0e700f33f13c568dc209341b8ab4b64148a235c70b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "023f4c9928786909d9fcb2143edcb1ce9a20d1b15cf281559996f21617503f91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eeef50c6dbb27c9ae8bbca0e2be73384ba60469957414bc2943892ef28836b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3c50ff8443f151a8022b4934dc0e87cd74d500719b586c82bce2184bac3ec2d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cac095d827e58ed8992e3eb2bc4285823c8378247de15d7ddc3f97c79d275f8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c3d754d426defee4e705ab9b72862764a22a64f316a1f8a2563a72cae308c31f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4a901cc6ab10bd1546d8453bd1bcf75379880ee549329c03ecfd4b445b52de99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58d19c2ca76b765809a99f0eb2227291f4f51860723d303f9ef0cb20d4d19dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98d605b3578ac3b7518f151c24c937455b204441ba806ea244f22e54c03af2be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8222535124cf1bf77c3af3e6ce3b3a942390794440b01f8d2fd44b4e416b049b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "33793d37f2415d724c58c993c2ad6cc67d661253b929165f6f0ab0c88c8325c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "235c6f47146d2bf5dd20ff3971421489c69517be3b467ec1a2b6f7dc0f2d8a94"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1859a1e462fbb1db039e99f7cfea16e6da59188ad37b313181211ab2c3d70150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901658f7361b4d15145d07de99b9d921d7293699a15479f086f4d1a00fedf089"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A55M-DS2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4be0b29ff5fd55d855e5529912b92acea24740eb7fa0250ba01a44824c4685b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E350N WIN8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4fd09df247091f6c6ead14d012325d14055ab38095f5c4d8c258352f48c2052f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7e95d1a64976573e5ed1c8c3466e24037d33fcfbbd9f02d1ae69643fdaa44d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASV3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00d23573a79d5737cfc6a1094b12e22c8a8601618934193dba2242f0246af559"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61TN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f19c7fe7e25a9a41b4065791fa390b8d79ceee0cc7fafae702a92a6ec0e86696"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "506f5abb01dade2137a4b8d3ea42d1127f24f59f96339e77c59883571ae63443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ffb3921b21ffdb876b2cbc7b6ff939fb5168efdf5ceed571d2d220e195fb150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25c38be153f85659377f63b4968f5425bf7e8d6c99fb695eeaaed973939bd943"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcd286446cd358474b492a2c9a4d49eab652aeda52c0e69ef94b1cd12b7579b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2P-R3 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e26169fbddeb0ca9b8283dba44d571b554487b5dd9348caf84fe9d7a6a20dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0adc82a52cbe367efed31279d6e1ea3ab98311db49a68ae149e4af9a70ab67a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67-DS3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ff5f5836457aa7fd0f02d037d0dc23b5c5a49fef8f7360268d7276e577060256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b8fb25742a7753c0f7ebac50e9e3d6186ea123dcd0e33eb0a64abc111eaa7728"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3R-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "435e0ba0715afef2a466835c19105c6480a35f921af59b863f2c29ed2d1de0e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MA-D2H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8d1572bf6bb0b658f618c735322e6c1aa20d01b79c9100e3d177b6c27ced480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-D3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d36182899b2c912ba34f51b50bbf228e1ec367b0fc009d20d34e4f011f4e9fc1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-UD3-B3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c46c76138b4cf0a3407c3fe2844c11fdd5c0c2c4d335ab58aa0b0617a6f13f33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3R-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50d3dc2e80333527177e5f5e1dbc06357ecaae3fa2dd1d51272a906ade3cd7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD4-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "beedbc9f64d20973229b584d965bcaf2f8fdc4a88c4bc202eb5e9f5565c85fa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3-iSSD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f615668a861c9d430afe7b40f42f352881132d193d16426951563997fbdc81da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3552918dfc84151da3dabc0687a4513f1dea9d6879d53a8b8646398fc462e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4f33b57947d45b3e43bdd7bafd68d2f4c799fdf0b72a8a2ca61319ab760ae67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68P-DS3 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5823dc1fbc95d092e02519c069c4fd111783428757b969fd8b9dbac1009fe91e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "384d9e1e3cad82b7841f33115dbfdf38589420716c8c0aa5a190971a44aa39e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2065b895916edbec17057603ba98779b4bd10cbfc3477a87c767a36fb027b76a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c9d4c8caf3307da9b1d6543e00682a3cddf1dc06c41f0f973355cb9c8554bc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68AP-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7013aca3c062f040cf9d0448f7e2892101b30e5956915c8dc3a53c3c2aacd13d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68M-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6d451499ebe6d8dd621f1c2ebb00b87dd01f7870b791e682b66d5f33eb01d8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c676efd7e6c8bf4a7d3da8aa51b2b564d77c67f6d2be68b25232326166e0c20b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ae3a48e1a715461671107f9e8e790cfd1c4ee4d2b8ddaa50b140d67622b920f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b2aaaa9f92c0e6fa23a59bdda27d5cb26e8fdece26bc756893490d3ee657a4b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN-D (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcf7c3d07e1bf9f1347e48dd3ac6e45fc9492648985a06394ab6568a7a71e262"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b619d396378c2e6bc2f550cf1c55cd17e7091fa4ab90761f32582eba28884d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cfa61511dad005aeb4ab01678f87169c7d509d59042b2fd33e8b58bdb34febe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL3 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7196b64c2f89763d2ea7f0f106d06352ae2c0e17a83fed2d10548e1aefa39245"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD4H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ff3a0cad413c0b862ba515d60cac0e98e373e199f0d92c79a77ebe6fa6a2247"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q77M-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43216a565586f1c49090c7982e6f3c1e41b179e430d7ac0c47c8ad07308a5bc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f6cd8446d78da9720f06cd360a48e9b6bdae33e342e18cb05420adb78fe05858"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1209a2eb0b5eb9324e1a8ce11c77ca141023b94b988bd1df4db390dda4c275a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77P-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00fa676c6d12df8a48049f39b87e3343769356e880d2abcaf04ab1b679c450f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP4 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5310894b9a2bb510f37c49852d743d64343a698436ca22d9b7a44bcf20e447a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q1742F",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "350cc51e5e7fa472e95460eed374eb1f9a43ea4e615e2654c26a9da4d83bf529"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f86f7ad9ffbc7437bba6bcf99d08b8de38f945bedff00c2d35362387077eabea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q2542N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d6faf2792722d1b9fbff087e4d85ddd2a4f9922a7848ed4db99284687df3b23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "642290f1b37e616b64b3c6b60921e24ddad599a38e67cd46a281b24c1ab62bb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-rp5-retail-system-model-5810",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "2a090cfc69ebd88dbe2e2e9c52a7f3a75b8b150478e30a752c5c0f09129f3bc9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-g2-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "d0a54ae69192d2d0289b2c9ae33a6ffd0a0db78189b41b032e18a3452c878eab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z228-microtower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "5174331d57cf3392012b00a6de381ee7a873f7fbd217bfa3e744b7dd6136807b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z820-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b02cdd16e398c2f31e9641d27d99865c404357136f857a1e2dcf2f7479b9457d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z420-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "05e89382e73afb280f637acbfa1029e9107dd30c78df37b6a00f184657f5f2c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b6fd5cd3364bdfa459f040c1693b879bbcf508513124bb95b5f36743efd8e73c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z220-convertible-minitower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "cc5a9c2d4827e9b1501c2dc0a464f580d4a2d65e4ff83dbab548e51839339d06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-400-g1-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "289f0fa72150a52f2b71bc6bf23f343ad9c1c412aa5977e89ffde7474562cb18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-600-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "a80a5c395fd3b28b0130d4579dd3e462f9e38bccb2a42cc5245cedd70b27ff0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-elite-8380-convertible-minitower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "455164a23e14f8cc9567b458dfb85106294f149f0e446d2d8b4036551f894cf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-705-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "1650cfd06bb698ad3cecd9e0c38b0de04d29f9c397492ba70b985b033e2458da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-pro-6305-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "44988d41019bf5c7989b71e966b97752f60c835ba2300c7d55323eded97c21e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-800-g1-tower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "659078fcdff1dead57cd05eafa0af4de667b52e981d1b907f0d963b41902dc7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-10w-type-82st-82su",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "69dae6e64125b37fa0ee09f5cd9bf3581b3244e99d9b4651395834f9eef021af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "b04cc879ac09941e714a8ccce371111bcbbc8d7b1dd1ecdc823de09fd2dad7b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m72z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "4438137139edb1e04de7e265e94444e1c87316b0821178285d87763f00bcc5df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-92z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "e37c7b66aef1c9702b08f3d08a41edf3e4617fc94a17f318297506868e1d254e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "76c5461e86a33095c4191aa02ccba85cdad5f24ac9c816fb8ab6f408cf32dcdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-62-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "73a8fdf89ed1a2d0af45142f4b4498545ce4182ca704ad2b292490263480b1fd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-510-22asr",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "47affcc25ded66333920985902473398438b49dac28be82542062ddabffec3c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-300-22isu",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "a6b6a2940a5f4c98e2f531624707fd8ab7dc61f4b3d3de0457fe00ba3cc5c135"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c460-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "1235ca01cc48484db1157b312ec1632c45be511cfbff28d25404df0a3df47148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c365-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "7cf94927f6826886883baf229f3cc2f2545588a564ddb7583f2b52853aeb5b21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-erazer-x700-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "8dbcebb69c00242f0a346c34776171061d606262f412e92f84be99301d413c21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-h520e-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "0ee94a5c0d4b93a2a1618d144bb0a505865a5d308c484c80fcf26fe31f23617a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Supermicro",
"versions": [
{
"status": "affected",
"version": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Binarly Research team"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T21:48:41.125Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "UEFI Forum Standards on SecureBoot and Driver Signing Advisory",
"tags": [
"product",
"technical-description"
],
"url": "https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html"
},
{
"name": "Binarly Finder\u0027s Advisory",
"tags": [
"technical-description"
],
"url": "https://www.binarly.io/advisories/brly-2024-005"
},
{
"name": "CERT/CC Advisory",
"tags": [
"third-party-advisory"
],
"url": "https://kb.cert.org/vuls/id/455367"
},
{
"name": "Binarly Technical Description",
"tags": [
"technical-description",
"signature"
],
"url": "https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md"
},
{
"name": "Supermicro Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
},
{
"name": "Intel Advisory cum End-ofLife anouncement",
"tags": [
"vendor-advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
},
{
"name": "Fujitsu Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
},
{
"name": "Gigabyte Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.gigabyte.com/us/Support/Security/2205"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Insecure Platform Key (PK) used in UEFI system firmware signature",
"x_generator": {
"engine": "VINCE 3.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-8105"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-8105",
"datePublished": "2024-08-26T19:15:11.237Z",
"dateReserved": "2024-08-22T19:50:07.296Z",
"dateUpdated": "2025-08-25T21:48:41.125Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-50197 (GCVE-0-2023-50197)
Vulnerability from cvelistv5
Published
2024-05-03 02:14
Modified
2024-08-15 15:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Driver & Support Assistant |
Version: 23.3.25.6 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:intel:driver\\\u0026support_assistant:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "driver\\\u0026support_assistant",
"vendor": "intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-50197",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-19T14:38:03.377106Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:50:50.156Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T22:09:49.786Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ZDI-23-1773",
"tags": [
"x_research-advisory",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1773/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Driver \u0026 Support Assistant",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"dateAssigned": "2023-12-05T19:37:59.540Z",
"datePublic": "2023-12-13T18:13:10.483Z",
"descriptions": [
{
"lang": "en",
"value": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver \u0026 Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-03T02:14:22.353Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-23-1773",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1773/"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2023-50197",
"datePublished": "2024-05-03T02:14:22.353Z",
"dateReserved": "2023-12-05T16:15:17.539Z",
"dateUpdated": "2024-08-15T15:50:50.156Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-42099 (GCVE-0-2023-42099)
Vulnerability from cvelistv5
Published
2024-05-03 02:13
Modified
2024-08-15 15:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Driver & Support Assistant |
Version: 23.3.25.6 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:intel:driver\\\u0026support_assistant:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "driver\\\u0026support_assistant",
"vendor": "intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42099",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-19T14:47:24.000027Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:50:14.641Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:50.384Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ZDI-23-1449",
"tags": [
"x_research-advisory",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1449/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Driver \u0026 Support Assistant",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "23.3.25.6"
}
]
}
],
"dateAssigned": "2023-09-06T21:25:45.367Z",
"datePublic": "2023-09-21T18:10:14.369Z",
"descriptions": [
{
"lang": "en",
"value": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver \u0026 Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-03T02:13:11.158Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-23-1449",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1449/"
}
],
"source": {
"lang": "en",
"value": "Anonymous"
},
"title": "Intel Driver \u0026 Support Assistant Link Following Local Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2023-42099",
"datePublished": "2024-05-03T02:13:11.158Z",
"dateReserved": "2023-09-06T21:14:24.432Z",
"dateUpdated": "2024-08-15T15:50:14.641Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3411 (GCVE-0-2024-3411)
Vulnerability from cvelistv5
Published
2024-04-30 18:39
Modified
2025-11-04 17:20
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.
References
Impacted products
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:intel:*:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "*",
"vendor": "intel",
"versions": [
{
"status": "affected",
"version": "IPMI 2.0, revision 1.1E7"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-3411",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-01T15:09:39.893298Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-331",
"description": "CWE-331 Insufficient Entropy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T21:17:11.689Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T17:20:29.012Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://kb.cert.org/vuls/id/163057"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability"
},
{
"url": "https://www.kb.cert.org/vuls/id/163057"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "iDRAC8",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2.86.86.86"
}
]
},
{
"product": "IPMI",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "2.0, revision 1.1E7"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-331 Insufficient Entropy",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-03T20:35:33.625Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://kb.cert.org/vuls/id/163057"
},
{
"url": "https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf"
},
{
"url": "https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Insufficient Randomness When Validating an IPMI Authenticated Session",
"x_generator": {
"engine": "VINCE 3.0.4",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-3411"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-3411",
"datePublished": "2024-04-30T18:39:36.861Z",
"dateReserved": "2024-04-05T20:48:24.306Z",
"dateUpdated": "2025-11-04T17:20:29.012Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4324 (GCVE-0-2023-4324)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:17.767Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4324",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T17:54:08.973670Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T17:57:24.262Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:23.250Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4324",
"datePublished": "2023-08-15T18:25:38.873Z",
"dateReserved": "2023-08-14T21:06:24.381Z",
"dateUpdated": "2025-11-04T16:10:17.767Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4325 (GCVE-0-2023-4325)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:18.806Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4325",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T17:58:07.119861Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:00:04.293Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:23.421Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4325",
"datePublished": "2023-08-15T18:25:38.706Z",
"dateReserved": "2023-08-14T21:10:36.380Z",
"dateUpdated": "2025-11-04T16:10:18.806Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4326 (GCVE-0-2023-4326)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:19.802Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"status": "affected",
"version": "0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4326",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:01:37.725882Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:03:09.590Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-327",
"description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:54:56.874Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4326",
"datePublished": "2023-08-15T18:25:38.586Z",
"dateReserved": "2023-08-14T21:19:37.314Z",
"dateUpdated": "2025-11-04T16:10:19.802Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4329 (GCVE-0-2023-4329)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:22.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4329",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:19:53.153951Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:22:13.644Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:24.200Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4329",
"datePublished": "2023-08-15T18:25:38.060Z",
"dateReserved": "2023-08-14T21:25:58.373Z",
"dateUpdated": "2025-11-04T16:10:22.787Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4331 (GCVE-0-2023-4331)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:23.816Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4331",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:23:15.858042Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:25:44.197Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-327",
"description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:55:43.479Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4331",
"datePublished": "2023-08-15T18:25:37.408Z",
"dateReserved": "2023-08-14T21:25:58.466Z",
"dateUpdated": "2025-11-04T16:10:23.816Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4332 (GCVE-0-2023-4332)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:24.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4332",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:27:15.721447Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:29:50.058Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:56:55.253Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4332",
"datePublished": "2023-08-15T18:25:37.323Z",
"dateReserved": "2023-08-14T21:25:58.608Z",
"dateUpdated": "2025-11-04T16:10:24.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4334 (GCVE-0-2023-4334)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller Web server (nginx) is serving private files without any authentication
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:27.191Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4334",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:35:07.326506Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:35:21.552Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller Web server (nginx) is serving private files without any authentication"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:24.923Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller Web server (nginx) is serving private files without any authentication",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4334",
"datePublished": "2023-08-15T18:25:37.123Z",
"dateReserved": "2023-08-14T21:25:58.724Z",
"dateUpdated": "2025-11-04T16:10:27.191Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4335 (GCVE-0-2023-4335)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2024-10-08 19:37
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:24:04.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:broadcom:lsi_storage_authority:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "lsi_storage_authority",
"vendor": "broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:intel:raid_web_console_3:-:*:*:*:*:windows:*:*"
],
"defaultStatus": "unaffected",
"product": "raid_web_console_3",
"vendor": "intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4335",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:35:49.902757Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:37:21.254Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.101Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4335",
"datePublished": "2023-08-15T18:25:37.042Z",
"dateReserved": "2023-08-14T21:25:58.771Z",
"dateUpdated": "2024-10-08T19:37:21.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-4336 (GCVE-0-2023-4336)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:28.367Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4336",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:37:55.233368Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:38:10.743Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.290Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4336",
"datePublished": "2023-08-15T18:25:36.778Z",
"dateReserved": "2023-08-14T21:27:55.157Z",
"dateUpdated": "2025-11-04T16:10:28.367Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4337 (GCVE-0-2023-4337)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:29.412Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4337",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:39:11.305505Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:39:39.529Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.451Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4337",
"datePublished": "2023-08-15T18:25:36.690Z",
"dateReserved": "2023-08-14T21:27:55.221Z",
"dateUpdated": "2025-11-04T16:10:29.412Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4338 (GCVE-0-2023-4338)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:30.391Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4338",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:40:13.790581Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:40:23.085Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.625Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4338",
"datePublished": "2023-08-15T18:25:36.445Z",
"dateReserved": "2023-08-14T21:27:55.350Z",
"dateUpdated": "2025-11-04T16:10:30.391Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4339 (GCVE-0-2023-4339)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:31.336Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4339",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:41:47.878961Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:41:58.772Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:25.818Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4339",
"datePublished": "2023-08-15T18:25:35.162Z",
"dateReserved": "2023-08-14T21:27:55.417Z",
"dateUpdated": "2025-11-04T16:10:31.336Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4340 (GCVE-0-2023-4340)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:32.353Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4340",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:42:32.043734Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:43:09.978Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.025Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4340",
"datePublished": "2023-08-15T18:25:35.073Z",
"dateReserved": "2023-08-14T21:27:55.493Z",
"dateUpdated": "2025-11-04T16:10:32.353Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4341 (GCVE-0-2023-4341)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:33.306Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4341",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:43:37.493202Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:43:58.895Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.182Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4341",
"datePublished": "2023-08-15T18:25:34.542Z",
"dateReserved": "2023-08-14T21:27:55.642Z",
"dateUpdated": "2025-11-04T16:10:33.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4342 (GCVE-0-2023-4342)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:34.249Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4342",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:02:18.354310Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:02:31.717Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.404Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4342",
"datePublished": "2023-08-15T18:25:34.363Z",
"dateReserved": "2023-08-14T21:29:11.769Z",
"dateUpdated": "2025-11-04T16:10:34.249Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4343 (GCVE-0-2023-4343)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:35.278Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4343",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:03:40.979136Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:03:56.153Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:26.622Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4343",
"datePublished": "2023-08-15T18:25:34.170Z",
"dateReserved": "2023-08-14T21:29:37.816Z",
"dateUpdated": "2025-11-04T16:10:35.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4344 (GCVE-0-2023-4344)
Vulnerability from cvelistv5
Published
2023-08-15 18:25
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-331 - Insufficient Entropy
Summary
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:36.254Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-4344",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:24:49.458889Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:26:09.035Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-331",
"description": "CWE-331: Insufficient Entropy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-05T21:58:03.947Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4344",
"datePublished": "2023-08-15T18:25:34.072Z",
"dateReserved": "2023-08-14T21:29:52.908Z",
"dateUpdated": "2025-11-04T16:10:36.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4323 (GCVE-0-2023-4323)
Vulnerability from cvelistv5
Published
2023-08-15 18:21
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:16.803Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4323",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:05:02.040092Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:05:12.818Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:23.092Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4323",
"datePublished": "2023-08-15T18:21:36.882Z",
"dateReserved": "2023-08-14T21:02:26.963Z",
"dateUpdated": "2025-11-04T16:10:16.803Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4345 (GCVE-0-2023-4345)
Vulnerability from cvelistv5
Published
2023-08-15 17:46
Modified
2025-11-04 16:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Broadcom | LSI Storage Authority (LSA) |
Version: 0 < 7.017.011.000 |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:37.202Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.broadcom.com/support/resources/product-security-center"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4345",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T20:16:56.558213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T20:17:59.774Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "LSI Storage Authority (LSA)",
"vendor": "Broadcom",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RAID Web Console 3 (RWC3)",
"vendor": "Intel",
"versions": [
{
"lessThan": "7.017.011.000",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Intel DCG"
}
],
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user"
}
],
"providerMetadata": {
"dateUpdated": "2023-09-16T02:04:27.021Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"value": "This issue is fixed in 7.017.011.000. For more information please contact your Broadcom representative."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Broadcom RAID Controller web interface is vulnerable client-side control bypass",
"x_generator": {
"engine": "cveClient/1.0.14"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-4345",
"datePublished": "2023-08-15T17:46:38.983Z",
"dateReserved": "2023-08-14T21:30:09.111Z",
"dateUpdated": "2025-11-04T16:10:37.202Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2022-29901 (GCVE-0-2022-29901)
Vulnerability from cvelistv5
Published
2022-07-12 00:00
Modified
2024-08-03 06:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Information Exposure
Summary
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel Microprocessors |
Version: generations 6 to 8 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:33:43.000Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://comsec.ethz.ch/retbleed"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
},
{
"name": "[oss-security] 20220712 Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/2"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/4"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/5"
},
{
"name": "[oss-security] 20220713 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/13/1"
},
{
"name": "FEDORA-2022-c69ef9c1dd",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/"
},
{
"name": "FEDORA-2022-8aab5b5cde",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/"
},
{
"name": "DSA-5207",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5207"
},
{
"name": "[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20221007-0007/"
},
{
"name": "[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
},
{
"name": "GLSA-202402-07",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202402-07"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Microprocessors",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "generations 6 to 8"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Johannes Wikner - ETH Z\u00fcrich"
},
{
"lang": "en",
"value": "Kaveh Razavi - ETH Z\u00fcrich"
}
],
"descriptions": [
{
"lang": "en",
"value": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Information Exposure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-04T08:06:41.365Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"url": "https://comsec.ethz.ch/retbleed"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
},
{
"name": "[oss-security] 20220712 Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/2"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/4"
},
{
"name": "[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/12/5"
},
{
"name": "[oss-security] 20220713 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/07/13/1"
},
{
"name": "FEDORA-2022-c69ef9c1dd",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/"
},
{
"name": "FEDORA-2022-8aab5b5cde",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/"
},
{
"name": "DSA-5207",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5207"
},
{
"name": "[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221007-0007/"
},
{
"name": "[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
},
{
"url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
},
{
"name": "GLSA-202402-07",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202402-07"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-29901",
"datePublished": "2022-07-12T00:00:00.000Z",
"dateReserved": "2022-04-28T00:00:00.000Z",
"dateUpdated": "2024-08-03T06:33:43.000Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0583 (GCVE-0-2020-0583)
Vulnerability from cvelistv5
Published
2020-03-12 21:08
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Escalation of Privilege
Summary
Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel® Smart Sound Technology |
Version: before 10th Generation Intel® Core™ i7 Processors - version 3431 Version: before 8th Generation Intel® Core™ Processors - version 3349 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.304Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel\u00ae Smart Sound Technology",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "before 10th Generation Intel\u00ae Core\u2122 i7 Processors - version 3431"
},
{
"status": "affected",
"version": "before 8th Generation Intel\u00ae Core\u2122 Processors - version 3349"
},
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-12T21:08:50.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0583",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel\u00ae Smart Sound Technology",
"version": {
"version_data": [
{
"version_value": "before 10th Generation Intel\u00ae Core\u2122 i7 Processors - version 3431"
},
{
"version_value": "before 8th Generation Intel\u00ae Core\u2122 Processors - version 3349"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0583",
"datePublished": "2020-03-12T21:08:50.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.304Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0551 (GCVE-0-2020-0551)
Vulnerability from cvelistv5
Published
2020-03-12 21:04
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) Processors Load Value Injection |
Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.308Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0002/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Processors Load Value Injection",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T09:06:12.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0002/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0551",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Processors Load Value Injection",
"version": {
"version_data": [
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200320-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200320-0002/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0551",
"datePublished": "2020-03-12T21:04:48.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.308Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0550 (GCVE-0-2020-0550)
Vulnerability from cvelistv5
Published
2020-03-12 21:02
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Snoop Assisted L1D Sampling Advisory |
Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.329Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0001/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Snoop Assisted L1D Sampling Advisory",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T09:06:13.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0001/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0550",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snoop Assisted L1D Sampling Advisory",
"version": {
"version_data": [
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200320-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200320-0001/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0550",
"datePublished": "2020-03-12T21:02:34.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.329Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0530 (GCVE-0-2020-0530)
Vulnerability from cvelistv5
Published
2020-03-12 20:55
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Escalation of Privilege
Summary
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) NUC Firmware |
Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.389Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUC Firmware",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-12T20:55:01.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUC Firmware",
"version": {
"version_data": [
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0530",
"datePublished": "2020-03-12T20:55:01.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.389Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0574 (GCVE-0-2020-0574)
Vulnerability from cvelistv5
Published
2020-03-12 20:52
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Improper configuration in block design for Intel(R) MAX(R) 10 FPGA all versions may allow an authenticated user to potentially enable escalation of privilege and information disclosure via physical access.
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) MAX(R) 10 FPGA |
Version: All versions Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.194Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) MAX(R) 10 FPGA",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "All versions"
},
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper configuration in block design for Intel(R) MAX(R) 10 FPGA all versions may allow an authenticated user to potentially enable escalation of privilege and information disclosure via physical access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-18T12:23:43.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0574",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) MAX(R) 10 FPGA",
"version": {
"version_data": [
{
"version_value": "All versions"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper configuration in block design for Intel(R) MAX(R) 10 FPGA all versions may allow an authenticated user to potentially enable escalation of privilege and information disclosure via physical access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0574",
"datePublished": "2020-03-12T20:52:29.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.194Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0567 (GCVE-0-2020-0567)
Vulnerability from cvelistv5
Published
2020-03-12 20:51
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access.
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.7212 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.313Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0003/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Graphics Drivers",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "before version 26.20.100.7212"
},
{
"status": "affected",
"version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-20T09:06:24.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200320-0003/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0567",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Drivers",
"version": {
"version_data": [
{
"version_value": "before version 26.20.100.7212"
},
{
"version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
}
]
}
}
]
},
"vendor_name": "Intel"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200320-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200320-0003/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0567",
"datePublished": "2020-03-12T20:51:09.000Z",
"dateReserved": "2019-10-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:02:52.313Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}